Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You have been asked to perform a security review of a vendor - hosted application that your organization is considering procuring. The system will contain
You have been asked to perform a security review of a vendorhosted application that your organization is considering procuring. The system will contain sensitive private customer data, which your organizations workers will need to access and update from the field. Reviewing the documentation and examining a demonstration site from the vendor, you find the following:
The system uses a typical webbased architecture client browser, web front end server, database back end server The server stack is Microsoft IIS MSSQL but the application was programmed in HTML so that it can be browseragnostic.
Communications between the browser and the web server use HTTP on port TCP; communications between the web server and the database server use MSSQL protocols on port TCP
The vendors Internet gateway is protected by multiple layers of network protection: a network firewall, intrusion detection system, network antivirus, and a web application firewall. These are configured to monitor the authorized HTTP traffic to the web server and to block any other traffic.
Each user must have a unique username and create a strong password. If a user forgets his or her password, he or she can use a Forgot password? link on the application to have the current password sent to his or her email address. Passwords are required to be characters in length and contain a mix of upper and lowercase letters, numerals, and symbols.
Every user transaction in the application is logged in a separate database, showing the transaction, what user account performed it when it occurred, and the IP address of the browser client. Only the vendors database administrators have access to modify these audit logs
Data input is validated at the browser using a normalization routine, prior to being sent to the web server.
Database fields containing sensitive data, including user passwords, will be encrypted in the database using AES encryption.
The application servers are hosted in a SSAE compliant datacenter.
To ensure availability, activepassive replication across a private network keeps redundant servers in a datacenter across the country constantly updated. If the primary datacenter becomes unavailable, it will take only seconds for the application to automatically switch to the secondary datacenter.
Which of the following would you NOT suggest as a way of improving authentication for this system?
Hashing and salting the passwords in the database.
Introducing a second factor of authentication, such as a hardware or software token.
Storing the passwords using reversible encryption.
Allowing longer passwords.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started