Submitted by: Submitted by tboonyapas
Views: 307
Words: 1035
Pages: 5
Category: Science and Technology
Date Submitted: 07/20/2013 09:24 AM
Assignment 1
Web Server Application Attacks
CIS502
Theories of Security Management
Professor Charles Dyer
Tatpong Boonyapas
ID:7456758547
16 July 2013
This research paper will explore the vulnerabilities and safeguards. Online users are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses and other malwares. Users also exposed to spoofing their private sessions, and to phishing of financial information. It is a common concern for private data being constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing on the Internet. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. Web server application attacks are common in today’s digital information sharing age. Understanding their implications, vulnerabilities, and safeguards is paramount, as our demands on e-Commerce and the Internet use have increased exponentially.
One of the dirty little secrets about security: there is simply no way to make your company impervious to a data breach. It’s almost a statistical certainty that you will, at some point or another, be hit with a security scenario that you’re not prepared for. That’s why security today is as much about damage control as it is about breach avoidance. In order to understand how data breaches occur, one should understand why data breaches happen. The data gathered from Verizon Business Risk Team and the Open Security Foundation, reveals three main types as the following:
1. Well-meaning insiders
2. Targeted attacks
3. Malicious Insiders
Incidents involving hacking and malware were both up considerably last year to previous years, and with hacking linked to almost all compromised records. This makes sense, as these threat actions remain the favored tools of external agents, who, as described above, were behind most breaches. Many...