logo

Threat Analysis and Security Controls for Web Applications and Servers

   

Added on  2023-06-04

12 Pages708 Words149 Views
Principles of
Information Security
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)

Introduction
The company of Gamble Bet IT security has been
comprised
The credit fraud system was raising alarm bells. The fraud
originated from credit card numbers of the company clients
This presentation will perform a threat analysis where the
report will state what ought to be tested and investigated.
We will outline what measures the organization need to
implement to mitigate the situation. In here the report will
outline security controls so that web applications and web
servers are not comprised again (Gallegos, 2016)

Background and problem analysis
Web applications and servers are popular
target for hackers and attackers
URL interpretation attack
SQL injection attack
Cross-site scripting
Cross-site request forgery (CSRF)

Parameter tampering
GambleBet system were
vulnerable to directly traversal
type of attack
LDAP injection
XML type on injection
Cont....

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Audit Plan for Gamble Bet Ltd Company
|13
|3754
|295

Performing a Website and Database Attack
|8
|1086
|40

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

ITNE2005 Assessment: Network Attacks and Security Audit Tools
|6
|1173
|283

Manage Network and Data Integrity
|18
|2078
|261

MEMO DATE: (Today’s Date) TO: (Tutor’s Name) FROM: (Student’s
|2
|302
|70