Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The Security Risk Assessment Handbook: A Complete Guide for Performing Security

ID: 3908575 • Letter: T

Question

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, second edition, Douglas J. Landoll

1. Section 10.2 mentions solution sets as the application of several safeguards to address a single vulnerability or a set of closely related vulnerabilities. Give an example of a solution set for the tollowing vulnerabilities: a. Front entrance is susceptible to piggy-backing. b. In-house-developed Web applications are susceptible to SQL injection attacks. c. Critical patches are not applied within 7 days. d. USB thumb drives containing sensitive data are lost outside of the building.

Explanation / Answer

Answer)

Example of the following are as follows:

a) Cultural backlash to badging

b) Injection payload which includes setting password field to password or 1=1

c) When update is not made . Example: When SP2 is not installed then hot fix won't work for days together in windows 2000.

d) Format of the disk, Improper mass removal from a computer are few examples of why sensitive data are lost.

Hope this answer helps. Happy to help. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote