Website Security and Vulnerability Assessment

Requirement 

As a security architect, write a paper that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.What is the difference between software testing and website vulnerability and security assessments?
How would you perform a website vulnerability and security assessment?
How can you use planned attacks to identify vulnerabilities?
How can you spot vulnerabilities in back-end systems and Structured Query Language (SQL) databases?
How would you prepare a vulnerability and security assessment report?
Deliverables:
Your paper should be 2-3 pages in length, not including the title and reference pages.You must include a minimum of two (2) credible sources and information from the module to support your writing. The Saudi Electronic University Library is a good source for resources.Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide provided below.

Solutions

Questions and answers
1.    What is the difference between software testing and website vulnerability and security assessments?
Software Testing is procedure that is run in order to find and rectify bugs in software and can be stated as the process of validating certain program or software for business use.
Whereas, website vulnerabilities are the weak points where the attackers can attack and steal your information from and these include web applications, servers and networks. The number of vulnerabilities keeps on increasing each day and every modification leaves a certain space for breach to take place. While, Security assessments have the goal to study as well as analyze the security of systems in an organization by the consent of all concerned parties. It can be said as one of the most successful tests for security
Hence, it can be said that all the three things differ from each other in the very usage and the meaning. Software testing is a procedure whereas website vulnerabilities are loop holes and lastly, security assessments are used for testing and analyzing the security of an organization. 

Are you having difficulty writing your information technology assignment or do you require assistance in writing your assignments? If this is the case, you may benefit from our database management assignment help. When a student comes to Allassignmenthelp.com with the request, 'write my assignment,' we provide them with immediate assignment help online at the most reasonable price.

2.    How would you perform a website vulnerability and security assessment?
In order to perform a vulnerability and security assessment check, it is important to checklist the following points (Acunetix, 2016).

  • a.    Understanding the basic attacks- understanding the different ways in which computer systems are compromised will help the organization in fighting these attacks in a better way.

  • b.    Collecting all the potential vulnerabilities-A list of all the potential vulnerabilities should be created and special care needs to be given to any unidentified item on the network.

  • c.    Using vulnerability tools- Many tools exist which can be used for checking security of the computer systems and they can check open ports, software which are un-patched etc.

  • d.    Assessing the risks- it is important to assess all the possible risks to the system.

3.     How can you use planned attacks to identify vulnerabilities?
Sudden attack can help us to identify the level of preparation by the security team at the moment of crisis. It helps us in analyzing how fruitful the security assessment practises have been for the company and more importantly it can help in training the staff at the time of attack and saving as much data as they can (Cissp, 2003).

4.    How can you spot vulnerabilities in back-end systems and Structured Query Language (SQL) databases?
It is important to secure them as they are not equally well protected as the front end systems, the reason being that the back-end systems do not provide the number of services which are provided by the front-end systems. Anyhow, the idea remains quite similar and the intention is access the data from back by compromising certain database or by escalation of privilege system. The procedure is similar but an additional discovery tool is required for the back-end system in order to identify the database (Soup, N.D.).

5.    How would you prepare a vulnerability and security assessment report?
There are various ways in which one can decide to go about the vulnerability and security basements and it is important to talk about each and every detail with everyone because such vulnerability tests and security assessments can also expose various loopholes in a company. This can be damaging for their business and image. It is important to ask and answer different question before starting of the test and it will definitely ensure least number of surprises for the members later on during the tests (Quinn, ND.).

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References

  • a.    Acunetix. (2016). Web application vulnerabilities. Retrieved April 17, 2016, from http://www.acunetix.com/vulnerabilities/

  • b.    Cissp, K. N. (2003). Global information assurance certification paper. Retrieved from https://www.giac.org/paper/gsec/3266/preparing-vulnerability-assessment/105387

  • c.    Qin, X., & Lee, W. Attack plan recognition and prediction using causal networks. Retrieved from http://wenke.gtisc.gatech.edu/papers/acsac_Qin_04.pdf

  • d.    Soup, T. Identifying vulnerabilities and risks on your network. Retrieved April 17, 2016, from http://www.techsoupforlibraries.org/planning-for-success/networking-and-security/identifying-vulnerabilities-and-risks-on-your-network

  • e.    Stop attacks on SQL Vulnerabilties. Retrieved April 17, 2016, from http://www.applicure.com/solutions/prevent-sql-injection-attacks

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order