logo

Security and Network PDF

6 Pages941 Words147 Views
   

Added on  2020-03-16

Security and Network PDF

   Added on 2020-03-16

ShareRelated Documents
Running head: SECURITY AND NETWORKSecurity and networkName of the studentName of the UniversityAuthor Note
Security and Network PDF_1
1SECURITY AND NETWORKAnswer to question 1:The technological advances made by the adoption of Web 2.0 techniques have madegreat innovations among the general population. However, this is also the reason for theconcerned population to become vulnerable to cyber attacks. There are various ways where theWeb 2.0 is changing the security related mechanisms in the internet. The first security challenge is the lack of appropriate authentication methods. Thisimplies that the contents in Web 2.0 applications are not authenticated well enough (Fuchs et al.,2013). This can lead to the hackers getting access to them by spending minimum resources toachieve that. Another security challenge is the vulnerability in cross site scripting. This enables themalicious inputs sent by the attackers to be stored in the system and displayed to the commonusers. This is another problem which is the main cause for security challenges. In addition, the injection attacks are also another security challenges. The XML injectionor the XPath injections are the most common methods which are used to pose injection threats tothe system. Answer to question 2:The software model is used for the development approaches to be taken for thedevelopment of software development processes. The main involvement of this method includesthe step by step method to be followed for the development of software. The requirements aremade as designs which are then translated into codes. The requirement phase includes the analysis of the consideration to be taken before thedevelopment of the project (Mishra & Dubey, 2013). The design phase of the process involves
Security and Network PDF_2
2SECURITY AND NETWORKthe planning of the system. This involves the generation of the design parameters to be integratedinto the software. The coding phase analyses the designs and translates it into the codes. Thetesting phase generates the testing of the software. It is done by beta testing or use case diagrams.The last phase is the deployment phase where the software is deployed to various users. Themajor relationship among the various phases is listed below:Fig 1: Software development process(Source: Created by the author)Answer to question 3:Due to the advancement of technologies, the need for a secure coding is essential to keepup with the increasing trends in cyber attacks. Thus, it is needed to consider the security checksduring coding (Fuggetta & Di Nitto, 2014). The five security issues included are:Requirement DesignCodingTestingDeployment
Security and Network PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Cyber-Security Tools in Using Automating Defense of Networks
|4
|655
|77

190 - web developmet
|4
|395
|232

Network Security Management
|12
|3039
|83

Network Vulnerability And Penetration Testing Assignment
|6
|1145
|23

Penetration Testing Penetration Testing
|52
|9148
|85