• Evaluate two different methods hackers presently use to vandalize Web servers. Determine which of these two methods would be more difficult for security personnel to defend against. From a risk management perspective, determine the method to which you, as a security manager, would allocate more resources. Justify your answer.
  • From the first e-Activity, explain from your perspective why hacktivism is a growing concern for companies and security professionals. Determine whether or not you believe the threat landscape is trending more toward targeted attacks and away from the traditional untargeted, random attack.
  • Explain whether or not you believe databases are an attractive target for hackers and why. Analyze the common database challenges that exist for the enterprise that may not be relevant for small and medium-sized business (SMBs) and why these challenges exist. Justify your answer.
  • From the second e-Activity, summarize the attack you researched. Determine why and how the attack was accomplished and how it circumvented the security controls of those attacked.
  • Assess how a good software configuration management program is critical to your Web application security. Analyze and present the use of discretionary access control (DAC), mandatory access control (MAC), Rules-Based, or Role-Based Access Controls in your response.
  • For Web applications, discuss how the best practices for mitigating vulnerabilities prevent buffer overflow (BO) attacks or SQL Injections (SQI). Give a real-life example of an actual BO or SQI attack, and discuss how it was addressed.

Open chat
Lets chat on via WhatsApp
Hello, Welcome to our WhatsApp support. Reply to this message to start a chat.