There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
ble than application code or as readily available as the network perimeter. There are many ways that these areas are exploited. The application side has its beginning with code which is poorly designed from a security perspective. One of the code items that is exploited by fraudsters to pivot across an organization's internal network is the Web.cfg file - in this file non security minded programmers often leave the User ID and password for connecting to the associated database in plaintext.
For part one of this assignment, write a 1 page summary that explains to a non IT person what this attack is, how it works and how to prevent it.
The second part of this assignment is about the secure perimeter. Using your choice of reference for securing a network (NIST, Rainbow Series Red Book, Common Criteria etc.) research on how to design a secure network perimeter that will protect the internal applications, even poorly written ones like the one above from being exploited. Include a diagram of your solution and on the bottom half - a written explanation, in APA format, of your solution.
1 answer:
You might be interested in
Answer:
B. Least privilege
Explanation:
- The principle of least privilege an important principle in computer security.
- It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
- For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
- This principle can be used only to limit and control access rights to system resources and applications.
- The least privilege is beneficial as it reduces the risk of unauthorized access.
- For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
Answer:
okahsb
Explanation:
Answer:
Money money money
Explanation:
Silcates are minerals with silicon bonded with oxygen.
Answer:
0 540 100 200 350 400 550 600 750
Explanation:
hope this helped