logo

Cyber Security: Motives of Web Application Attacks and Types of Vulnerabilities

   

Added on  2023-05-29

8 Pages1561 Words362 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note:

1
CYBER SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................4
References..................................................................................................................................6

2
CYBER SECURITY
Question 1
Summarizing and Demonstration of Motives of Web Application Attacks and
Differentiation between Various Types of Web Application Vulnerabilities
The web is the highly programmable environment, which is responsible for allowing
mass customization via immediate implementation of the larger as well as diversified
application range to the billions of globalized users (Razzaq et al. 2014). The web
applications are the computerized programs that enable the web site visitors for submitting as
well as retrieving confidential data from the database on the Internet with the help of
preferred web browser (Zhou et al. 2014). These data are then presented to the users in their
web browsers as the information gets generated dynamically.
The web application attacks are the targeted attacks that could determine what the
attacker wishes to complete. The attackers have some of the major and specified motives for
getting the idea that how the data should be protected. The most significant motives of the
web application attacks are as follows:
i) Information Theft: The first and the foremost motive of this type of web
application attack is the information theft. When the respective attacker aims in acquiring
relevant information owned by the target or even stored within the network. The information
is in the form of customer’s information, intellectual property and business related
information (Matsuda 2013). These attackers controlled infiltrating the security of the
organizational network via phishing mail that carried malware for exploiting the
vulnerabilities.
ii) Espionage: The most important objective of the attacker is monitoring the several
target activities and then steal relevant information that the targets comprise of. Thus, this is
termed as one of the major motives of the web application attacks for the users.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Author's note: "Web APPLICATION SECURITY ASSESSMENT 2 2 WEB APPLICATION SECURITY ASSESSMENT Name of student Name of university"
|18
|4249
|15

Information Security Awareness Assignment PDF
|7
|1466
|95

190 - web developmet
|4
|395
|232

Cross Site Scripting
|10
|2020
|363

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176