SlideShare a Scribd company logo
STRAYER SEC 420 Week 9 Web Application Attack
Scenario NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/sec-420-
strayer/sec-420-week-9-web-application-
attack-scenario-new
For more classes visit
http://www.assignmentcloud.com/
Assignment: Web Application Attack Scenario
Due Week 9 and worth 220 points
Suppose that you are currently employed as an
Information Security Manager for a medium-sized
software development and outsourcing services
company. The Software Development Director has
asked you to provide a detailed analytical report
for her department regarding the most common
web application threats and the manner in which
their products could compromise customer
financial data.
She wants your recommendations on which
threats and/or vulnerabilities the company should
focus on and your recommendation for mitigation.
The products in question use Microsoft SQL Server
databases and IIS Web servers.
Write a paper with no less than four pages in
which you:
1. Analyze the common threats/vulnerabilities to
data systems such as web applications and data
servers. Speculate on the greatest area of
vulnerability and potential for damage and/or
data loss of such data systems.
2. Devise at least one attack scenario, as an
example, where a hacker could use the area of
vulnerability that you chose above in order to gain
access to a network or sensitive data. Examine the
primary ways in which the hacker could execute
such an attack, and suggest the strategic manner in
which a security professional could prevent the
attack.
3. Explore the primary role that the human
element could play in adding to the attack
scenario, if appropriate. You may wish to decide if
the human component is critical in protection
from that type of attack.
4. Draw specific lessons and recommendations as
part of the conclusion, and have a strong
concluding paragraph. Be sure to revise your
introduction to reflect what the paper
accomplished once you finish your first draft.
5. Use no less than five quality resources in this
assignment. Note: Wikipedia and similar websites
do not qualify as quality resources.
Your assignment must follow these formatting
requirements:
• Be typed, double-spaced, using Times New
Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or
school-specific format. Check with your professor
for any additional instructions.
• Include a cover page containing the title of the
assignment, your name, the professor’s name, the
course title, and the date. The cover page and the
reference page are not included in the required
assignment page length.
Grading for this assignment will be based on
answer quality, logic / organization of the paper,
and language and writing skills, using the
following rubric.
Click here to view the grading rubric for this case
study.

More Related Content

DOC
Strayer sec 420 week 9 web application attack scenario new
DOC
Strayer cis 333 week 10 technical project paper
DOC
Strayer cis 333 week 10 technical project paper
PPTX
STAT!Ref Installation Instructions
DOCX
Assignment 2 critical infrastructure protection
DOCX
CIS 550 Success Begins / snaptutorial.com
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer sec 420 week 9 web application attack scenario new
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
STAT!Ref Installation Instructions
Assignment 2 critical infrastructure protection
CIS 550 Success Begins / snaptutorial.com
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks

More from Noahliamwilliam (20)

DOC
Ash hlt 540 week 3 assignment 1 coyne and messina articles
DOC
V grand canyon university nrs 440 v week 3 reflection paper new
DOC
Ash bus 308 week 5 quiz
DOC
Ash bus 308 week 4 quiz
DOC
Ash bus 308 week 2 problem set new
DOC
Uop qnt 275 final exam guide
DOC
Devry mgmt 591 week 7 course project
DOC
Devry mgmt 591 week 7 course project (veterinary centers of america) new
DOC
Devry mgmt 591 week 7 course project (marcelos care home) new
DOC
Devry mgmt 591 week 1to 7 all discussion question new
DOC
Devry mgmt 591 final exam guide set 2 new
DOC
Chamberlain college of nursing nr 351 week 3 assignment professional paper wo...
DOC
Chamberlain college of nursing nr 351 week 1 assignment time management plan ...
DOC
V grand canyon university nrs 430 v week 3 clc nursing conceptual model prese...
DOC
V grand canyon university nrs 429 v week 5 assignment clc new
DOC
V grand canyon university nrs 429 v week 2 assignment health promotion among ...
DOC
V grand canyon university nrs 429 v week 1 assignment vark analysis paper new
DOC
Uop qnt 561 final exam guide
DOC
Uop acc 547 week 4 jordan and diana diego
DOC
Uop acc 545 final exam guide new
Ash hlt 540 week 3 assignment 1 coyne and messina articles
V grand canyon university nrs 440 v week 3 reflection paper new
Ash bus 308 week 5 quiz
Ash bus 308 week 4 quiz
Ash bus 308 week 2 problem set new
Uop qnt 275 final exam guide
Devry mgmt 591 week 7 course project
Devry mgmt 591 week 7 course project (veterinary centers of america) new
Devry mgmt 591 week 7 course project (marcelos care home) new
Devry mgmt 591 week 1to 7 all discussion question new
Devry mgmt 591 final exam guide set 2 new
Chamberlain college of nursing nr 351 week 3 assignment professional paper wo...
Chamberlain college of nursing nr 351 week 1 assignment time management plan ...
V grand canyon university nrs 430 v week 3 clc nursing conceptual model prese...
V grand canyon university nrs 429 v week 5 assignment clc new
V grand canyon university nrs 429 v week 2 assignment health promotion among ...
V grand canyon university nrs 429 v week 1 assignment vark analysis paper new
Uop qnt 561 final exam guide
Uop acc 547 week 4 jordan and diana diego
Uop acc 545 final exam guide new
Ad

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
01-Introduction-to-Information-Management.pdf
PPTX
master seminar digital applications in india
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Classroom Observation Tools for Teachers
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Institutional Correction lecture only . . .
Microbial disease of the cardiovascular and lymphatic systems
human mycosis Human fungal infections are called human mycosis..pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O7-L3 Supply Chain Operations - ICLT Program
Cell Structure & Organelles in detailed.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Computing-Curriculum for Schools in Ghana
01-Introduction-to-Information-Management.pdf
master seminar digital applications in india
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
A systematic review of self-coping strategies used by university students to ...
Classroom Observation Tools for Teachers
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Ad

Strayer sec 420 week 9 web application attack scenario new

  • 1. STRAYER SEC 420 Week 9 Web Application Attack Scenario NEW Check this A+ tutorial guideline at http://www.assignmentcloud.com/sec-420- strayer/sec-420-week-9-web-application- attack-scenario-new For more classes visit http://www.assignmentcloud.com/ Assignment: Web Application Attack Scenario Due Week 9 and worth 220 points Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed analytical report
  • 2. for her department regarding the most common web application threats and the manner in which their products could compromise customer financial data. She wants your recommendations on which threats and/or vulnerabilities the company should focus on and your recommendation for mitigation. The products in question use Microsoft SQL Server databases and IIS Web servers. Write a paper with no less than four pages in which you: 1. Analyze the common threats/vulnerabilities to data systems such as web applications and data servers. Speculate on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. 2. Devise at least one attack scenario, as an example, where a hacker could use the area of vulnerability that you chose above in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in
  • 3. which a security professional could prevent the attack. 3. Explore the primary role that the human element could play in adding to the attack scenario, if appropriate. You may wish to decide if the human component is critical in protection from that type of attack. 4. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. 5. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • 4. • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Click here to view the grading rubric for this case study.