The Security Risk Assessment Handbook: A Complete Guide for Performing Security
ID: 3908575 • Letter: T
Question
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, second edition, Douglas J. Landoll
1. Section 10.2 mentions solution sets as the application of several safeguards to address a single vulnerability or a set of closely related vulnerabilities. Give an example of a solution set for the tollowing vulnerabilities: a. Front entrance is susceptible to piggy-backing. b. In-house-developed Web applications are susceptible to SQL injection attacks. c. Critical patches are not applied within 7 days. d. USB thumb drives containing sensitive data are lost outside of the building.Explanation / Answer
Answer)
Example of the following are as follows:
a) Cultural backlash to badging
b) Injection payload which includes setting password field to password or 1=1
c) When update is not made . Example: When SP2 is not installed then hot fix won't work for days together in windows 2000.
d) Format of the disk, Improper mass removal from a computer are few examples of why sensitive data are lost.
Hope this answer helps. Happy to help. :)
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.