Web Server Application Attacks

Submitted by: Submitted by

Views: 325

Words: 1481

Pages: 6

Category: Other Topics

Date Submitted: 04/28/2013 06:02 AM

Report This Essay

xxxxxxx

xxxxxx

xxxxxxxxxxx

xxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxx

xxxxxxxxxxxxxx University

Abstract

Our research paper will explore the vulnerabilities and safeguards. Online users are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses and other malwares. Users also exposed to spoofing their private sessions, and to phishing of financial information. It is a common concern for private data being constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing on the internet. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. Web server application attacks are common in today’s digital information sharing age. Understanding their implications, vulnerabilities, and safeguards is paramount as our demands on e-Commerce and the Internet use have increased exponentially

How Do Breaches Occur?

In order to understand how data breaches occur, one should understand why data breaches happen. The data gathered from Verizon Business Risk Team and the Open Security Foundation, reveals three main types as the following:

1. Well-meaning insiders

2. Targeted attacks

3. Malicious Insiders

Incidents involving hacking and malware were both up considerably last year to previous years, and with hacking linked to almost all compromised records. This makes sense, as these threat actions remain the favored tools of external agents, who, as described above, were behind most breaches. Many attacks continue to thwart or circumvent authentication by combining stolen or guessed credentials (to gain access) with backdoors (to retain access).

Five Major Trends:

1. Utilized some form of hacking

2. Incorporated malware

3. Involved physical attacks

4. Employed social tactics

5. Resulted from privilege misuse

Data Breach Reports:...