Assignment: Web Application Attack Scenario Suppose that you

Assignment: Web Application Attack Scenario Suppose that you.
Assignment: Web Application Attack Scenario Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed analytical report for her department regarding the most common web application threats and the manner in which their products could compromise customer financial data. She wants your recommendations on which threats and/or vulnerabilities the company should focus on and your recommendation for mitigation. The products in question use Microsoft SQL Server databases and IIS Web servers. Write a paper with no less than four pages in which you: Analyze the common threats/vulnerabilities to data systems such as web applications and data servers. Speculate on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. Devise at least one attack scenario, as an example, where a hacker could use the area of vulnerability that you chose above in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack. Explore the primary role that the human element could play in adding to the attack scenario, if appropriate. You may wish to decide if the human component is critical in protection from that type of attack. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, your name, the professor s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 220 Assignment: Web Application Attack Scenario Criteria Unacceptable Below 60 % F Meets Minimum Expectations 60-69 % D Fair 70-79 % C Proficient 80-89 % B Exemplary 90-100 % A 1. Analyze the common threats/ vulnerabilities to data systems such as web applications and data servers. Speculate on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. Weight: 25% Did not submit or incompletely analyzed the common threats/ vulnerabilities to data systems such as web applications and data servers, did not submit or incompletely speculated on the greatest area of threat/vulnerability and the potential for damage and/or data loss of such data systems. Insufficiently analyzed the common threats/ vulnerabilities to data systems such as web applications and data servers. Next, insufficiently speculated on the greatest area of threat/vulnerability and the potential for damage and/or data loss of such data systems. Partially analyzed the common threats/ vulnerabilities to data systems such as web applications and data servers, partially speculated on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. Satisfactorily analyzed the common threats/ vulnerabilities to data systems such as web applications and data servers. Satisfactorily speculated on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. Thoroughly analyzed the common threats/ vulnerabilities to data systems such as web applications and data servers, thoroughly speculated on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. 2. Devise at least one attack scenario, as an example, where a hacker could use the area of vulnerability that you chose above in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack. Weight: 25% Did not submit or incompletely devised any attack scenario where a hacker could use the area of chosen vulnerability in order to gain access to a network or sensitive data. Did not submit or incompletely examined the primary ways in which the hacker could execute such an attack, and did not submit or incompletely suggested the strategic manner in which a security professional could prevent the attack. Insufficiently devised any attack scenario where a hacker could use the area of chosen vulnerability in order to gain access to a network or sensitive data. Insufficiently examined the primary ways in which the hacker could execute such an attack, and insufficiently suggested the strategic manner in which a security professional could prevent the attack. Partially devised one or more attack scenario where a hacker could use the area of chosen vulnerability in order to gain access to a network or sensitive data. Partially examined the primary ways in which the hacker could execute such an attack, and partially suggested the strategic manner in which a security professional could prevent the attack. Satisfactorily devised one or more attack scenario where a hacker could use the area of chosen vulnerability in order to gain access to a network or sensitive data. Satisfactorily examined the primary ways in which the hacker could execute such an attack, and satisfactorily suggested the strategic manner in which a security professional could prevent the attack. Thoroughly devised one or more attack scenario where a hacker could use the area of chosen vulnerability in order to gain access to a network or sensitive data. Thoroughly the primary ways in which the hacker could execute such an attack, and thoroughly suggested the strategic manner in which a security professional could prevent the attack. 3. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. Weight: 30% Did not submit lessons and takeaway in the conclusion, or have concluding paragraph, or a paragraph or less of closing statement that only partially touches upon what was presented in the body. Does not have an introduction, or just a partial introduction. Had insufficient or partial lessons and takeaway in the conclusion, or weak concluding paragraph, or a paragraph or less of closing statement that touches upon what was presented in the body, or provides only a summary of key points. Does not have a complete or just a partial introduction. Has some or adequate lessons and takeaway in the conclusion, or weak concluding paragraph, or a paragraph or less of closing statement that touches upon what was presented in the body, or provides only a summary of key points. Does not have a complete introduction, or is missing a key element of an introduction. Covers most of the key lessons and takeaway in the conclusion, or recommendations but may fall short on some detail. Has a good to excellent introduction but may be missing an element. Thoroughly develops a multi-paragraph conclusion of key lessons and recommendations with sufficient depth and detail to lead to a strong concluding paragraph. Fully introduces the paper setting both the tone and scope of what the paper accomplished. 4. Five (5) references Weight: 10% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 5. Clarity, writing mechanics, and formatting requirements. Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present
Assignment: Web Application Attack Scenario Suppose that you

Don't use plagiarized sources. Get Your Custom Essay on
Assignment: Web Application Attack Scenario Suppose that you
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.

Admissions

Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.

Reviews

Revising your paper

Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers