Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Defending your company from disaster and Security Testing for obvious vulnerabil

ID: 3826252 • Letter: D

Question

Defending your company from disaster and Security Testing for obvious vulnerabilities

1-Create a fictitious company or organization. Describe the nature of its business, its location, the number of employees, and so forth.

2-Identify the challenges you would face in keeping your company running in the event of a disaster or interruption.

3-Prioritize the assets. Determine what mission-critical functions and systems would need to be recovered first, second, and so forth.

4-Research the Internet for several common software vulnerabilities(such as buffer over flow conditions, cross-site scripting, and SQL injection)

Explanation / Answer

1)Consider abc company which is a service based company located in the silicon valley .Total strength of the company about 100-400 employees. Company mainly deals with various services like developing applications , consulting, payment processing etc.

2) a)business interruption:
Fires and other unforeseen events leads to relocate or closing
b)Injury in workplace:
Injury in workplace leads to productivity loss and leads to inflate business
c) security breach:
Loss of data and data theft leads to fall of business

3) identify the business critical functions first and then essential functions later necessary functions and at last desirable functions.

Critical functions are one which have most impact on the business and potential for recovery.In company perspective network,system or application outage is mission critical.
Vital functions are addressed after mission critical functions these include payroll.

Important functions have a longer term impact this includes email Internet access and databases etc.

Minor functions include small recurring issues.

4) cross site scripting:
It is typically found in web applications intruders usually inject client site scripts into web pages which was viewed by other users.it is used to bypass access controls.

SQL injection: Attackers inject SQL statements that control a web application database server.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote