logo

Computing Technologies Assignment Report

The assignment involves designing and developing a web application security testing and evaluation report. The report should include a reflective commentary on the project, critical evaluation of web server-side technologies, and appraisal of web application security threats.

7 Pages1221 Words30 Views
   

Added on  2022-09-09

Computing Technologies Assignment Report

The assignment involves designing and developing a web application security testing and evaluation report. The report should include a reflective commentary on the project, critical evaluation of web server-side technologies, and appraisal of web application security threats.

   Added on 2022-09-09

ShareRelated Documents
University name:
Programme Title: Computing Technologies Extended Degree.
Module Title: Web Application Security
Module Code: QAC020N256A
Module Convenor: Dr. Muhammad Ali Kazmi
Coursework Title: Design and Develop Web Application Security Testing, Evaluation Report.
Student details.
Students Name Student Number
Due date:
1 of 4
Computing Technologies Assignment Report_1
Introduction.
The Web Application faces some vulnerabilities attacks and there is need in improving the
security for the web application. The attackers affect web server-side of the system. Different
vulnerabilities which affects the web application security are going to be identified. The report
will discuss comparison of different webserver side technologies in details different web
application security threats and their impact, the identified web application vulnerabilities and
web application security tools.
The evaluating and comparing of the webserver-side technologies critically.
The webservers get requests processes it and reply it by use of Http protocol (Vincent Lu, 2012).
This web servers are like containers of stores.
The webserver side is where system is hosted. for example, when a client makes request the server
replies the customer request. The website shall be hosted on the xampp server .
The most common web servers includes Apache,IIS ,Lightpd and Jagsaw.
The xampp contains apache and MySQL Services.
The xampp is a powerful sever which is used to host the website on the local host.
The apache Http server is most commonly used server and most operating system uses it .it is
open source.
These servers are commonly affected by different Vulnerabilities.
The languages or technologies affected by web server vulnerabilities are mainly those that are
being used in implementation of the website application for example PHP and Mysql .The Xampp
uses PHP and MYSQL.
The apache server is commonly used compared to other servers .
Internet Information service.
It very flexible to use and secure.It runs only on windows.
2 of 4
Computing Technologies Assignment Report_2
Lighttpd.
Uses less power and very secure .It runs on most platfom.
Appraising the web application security threats Critically and evaluating the security
threats impacts on business running of the system.
Stored(persistent) cross site scripting.
The forms of the websites are used by the attackers to insert malicious into the database of the
system. These malicious affects the functionality of the websites. The attacker steals cookies and
misuse the website functionality.
Sql injection.
The attacker input data from the browser to the web application to change the functionality of the
Structured Query Language quires in the database.
The attacker reads data which is sensitive from database. The attacker can insert, update and
delete data.
The attackers modify the SQL queries and executes database.
For example, attacker make application allows the login in without correct password and
username. This makes unauthorized people to access system.
Threat Impact on the business operation of the system.
The sql injects affects the normal sql codes making a database output wrong result.
The stored persistent cross site scripting steals cookies data and thus affect functionality of the
system.
The identified web application vulnerabilities.
The following entries were included as web server vulnerabilities;
3 of 4
Computing Technologies Assignment Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Vulnerability And Penetration Testing Assignment
|6
|1145
|23

Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176

Benefits for Online Web System Application
|40
|4587
|44

Network Security for Desklib's Online Library | Desklib
|11
|1250
|259

System Architecture and Security Requirements
|7
|751
|78

INFRASTRUCTURE FOR DEPLOYING A WEBSITE.
|3
|467
|1