SEC 435 Week 2 Discussion Web Application Threats NEW - PowerPoint PPT Presentation

About This Presentation
Title:

SEC 435 Week 2 Discussion Web Application Threats NEW

Description:

Check this A+ tutorial guideline at For more classes visit – PowerPoint PPT presentation

Number of Views:27
Slides: 3
Provided by: shyaminfo170

less

Transcript and Presenter's Notes

Title: SEC 435 Week 2 Discussion Web Application Threats NEW


1
STRAYER SEC 435 Week 2 Discussion Web Application
Threats NEW
http//www.assignmentcloud.com/sec-435- strayer/se
c-435-week-2-discussion-web- application-threats-n
ew For more classes visit http//www.assignmentclo
ud.com "Web Application Threats" Select one of
the following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph
Review the attacks listed on the OWASP
website, located at https//www.owasp.org/index.ph
p/CategoryAttac k. Focus on selecting three
attacks that you believe to be the greatest
security threat, rank what you believe to be the
top three greatest security threats (e.g.,
cookie/session poisoning, platform exploits,
etc.), and provide a rationale for your rankings.
Explain the key inherent dangers of the chosen
threats, and indicate the key reasons why you
believe such threats pose more of a risk than
other current ones in existence. Justify your
2
answer. Review the attacks listed on the OWASP
website, located at https//www.owasp.Org/index.ph
p/CategoryAttac k. Focus on selecting three
attacks that you believe to be the greatest
security threat, rank what you believe to be the
top three greatest security threats (e.g.,
cookie/session poisoning, platform exploits,
etc.), discuss the appropriate countermeasures
that security personnel could utilize in order to
minimize the damage of such threats. Determine
whether or not the countermeasures that you have
ranked are reactive or proactive in nature, and
suggest the primary ways in which each
countermeasure could assist in preventing further
damage from the threats in question. Explain
whether or not honeypots would assist in
protecting and evaluating the three threats
selected. Provide a rationale for your
response. Any current topic or article related
to penetration techniques. The instructor
insight.
Write a Comment
User Comments (0)
About PowerShow.com