Perspective Question from (corporate computer edition 4 ) Chapter 8: Application
ID: 3853613 • Letter: P
Question
Perspective Question from (corporate computer edition 4 ) Chapter 8: Application Security
1. What was the most surprising thing for you in chapter 8 Application Security?
2. What was the most difficult thing for you in in chapter 8 Application Security?
Learning Objective in this chapter is:
Explain why attackers increasingly focus on applications.
List the main steps in securing applications.
Know how to secure WWW services and e-commerce services.
Describe vulnerabilities in web browsers.
Explain the process of securing e-mail.
Explain how to secure voice over IP (VoIP).
Describe threats from Skype VoIP service.
Describe how to secure other user applications.
Know how to secure TCP/IP supervisory applications.
Thanks I really appreciate your help
Explanation / Answer
ANSWER:
1. Most Surprising thing in this chapter of Application security was,
Security Threat over VoIP- Attackers steals the services from service Provider which can lead to user credential theft. Attackers can eavesdrop and obtain user credentials like name, age, skypeid, password and other details of their Voice/video calls.
VoIP Phishing involves fake users calling you to obtain your essential and confidential information.
VoIP threats also involve denial of service which may consume the user’s bandwidth and spamming users over Internet Telephony.
Other threats like call tampering, launching viruses and malware was a bit surprising for me, as I am a daily user of Internet Telephony.
2. Most difficult thing for me in this chapter was understanding the vulnerabilities in Web Browsers.
Cross-Site Scripting vulnerabilities - trying to understand and implement XSS attack - understanding the vulnerability for dynamic web pages. Understanding the Denial of Services and buffer overflow in the web browsers - browsers entering infinite loop and boundary checking errors. Understanding the memory corruption vulnerabilities whether it be for HTML Object or Race Condition was a challenge for me. Overall understanding the taxonomy of web browser exploits and its vulnerabilities with the latest patch available was difficult to catch up.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.