Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1)Considering the flow diagram provided in section 3.5, list two good network security controls that are included in the design? 2) Consider the vulnerability statements

1)Considering the flow diagram provided in section 3.5, list two good network security controls that are included in the design?

image text in transcribed

2) Consider the vulnerability statements (risk scenarios) listed in section 4. Reflect on the password related statement, and possible mitigations?

image text in transcribed

3.5 Flow Diagram The following diagram shows the in-scope technology components reviewed as part of the MVROS. Interface to PayLink MVR Database Internet OTT Border Router Internet Firewall MVR Website Internal Firewall MVR Application Server 4. Vulnerability Statement The following potential vulnerabilities were identified: Vulnerability Description Cross-site scripting The web application can be used as a mechanism to transport an attack to an end user's browser. A successful attack can disclose the end user's session token, attack the local machine, or spoof content to fool the user. SQL injection Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application. Password strength Passwords used by the web application are inappropriately formulated. Attackers could guess the password of a user to gain access to the system. Unnecessary The web server and application server have services unnecessary services running such as telnet, snmp and anonymous ftp

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft Visual Basic 2008 Comprehensive Concepts And Techniques

Authors: Gary B. Shelly, Corinne Hoisington

1st Edition

1423927168, 978-1423927167

More Books

Students also viewed these Databases questions

Question

C# ONLY WITH COMMENTS PLEASE

Answered: 1 week ago

Question

Explain the steps involved in training programmes.

Answered: 1 week ago

Question

What are the need and importance of training ?

Answered: 1 week ago