Question

There are many different types of attacks that can happen to a web-based application. Find a...

There are many different types of attacks that can happen to a web-based application. Find a unique case study using the OWASP Top 10 and explain how it could be done, how it affected the company and the system and how best to protect against these types of attacks.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

OWASP - The Open Web Application Security Project is an international non profit organization dedicated to web application security.

OWASP Top 10 is a list of the 10 most dangerous current web application security flaws along with effective methods to handle these flaws. It is a regularly updated report put together by a variety of security experts from all over the world.

One of the top 10 security vulnerabilities is Injection Attack.

Injection attack occurs when untrusted data is send to an interpreter as part of a command or query and trick the interpreter into executing unintended commands and gives access to unauthorized data.

The SQL command which when executed by web application can also expose the back-end database. For example, an attacker could enter SQL database code into a form that expects a plain text username. If that form input is not properly secured, this could result in that SQL code being executed. This is known as SQL injection attack.

SQL injection is easy to implement. Tight deadlines, inexperienced developers and legacy code often result in variable code quality and security practices. A single vulnerable field in any form or API endpoint across a website that has access to a database may be sufficient to expose a vulnerability.

Implication

1. An attacker can inject malicious content into the vulnerable fields.

2. Sensitive data like username, passwords etc can be read from the database.

3. Database can be modified.

4. Administration operations can be executed on the database.

Consequences of SQL injection

1. Attackers can use SQL injections to find the credentials of other users in the database.

2. SQL injection can allow the attacker to gain complete access to all the data in the database server.

3. An attacker could use SQL injection to alter balances, void transactions or transfer money to their account.

4. An attacker could delete the data so that data will not be available until the database is restored.

5. an attacker could use SQL injection to attack the internal network behind a firewall.

Ways to prevent the SQL injection attacks

1. Update Regularly -It is essential to have updates regularly patched.

2.Use parameterized queries- This method forces the developers to first define all the SQL code and then to pass only the necessary parameters to the SQL query.

3. Escape all user supplied inputs- Escaping a character is the way of telling the database that not to parse it as a command but treat it as a literal.

4. Use of stored procedures- Stored procedures limit the risk associated with SQL injection by checking the type of input parameters and preventing the data that violates the type the field is designated to receive.

5. Enforce least privilege - Administrative accounts should in no instance be executing SQL commands as a result of a API call from an unauthorized request.

6. Web Application Firewall- A WAF can help to filter and find malicious data.

Add a comment
Know the answer?
Add Answer to:
There are many different types of attacks that can happen to a web-based application. Find a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • Read the case study carefully before answering the below three questions. Case Study: The marketing manager...

    Read the case study carefully before answering the below three questions. Case Study: The marketing manager of an airline company is looking at travel habits of business travelers. She noticed that business travelers tend to book just few days before flying, unlike economy who book far in advance. In fact, some business travelers may book as late as few minutes before flying. She wants a decision support system based on past bookings that can predict how many business class bookings...

  • 1-Advancement of technology changes our lifestyle with different types of systems and applications. According to the...

    1-Advancement of technology changes our lifestyle with different types of systems and applications. According to the facility and specialty of a device and application can be categorized as follows: a) System software b) Application software Explain (a) and (b) with definition, features, and branches for each that carries a complete understanding to the readers. And, expecting that the discussion not less than 150 words for each with 3 citations. 2-There are plenty of software development methodologies that have been developed...

  • QUESTION 5: Information Systems(ISs) can be categorised differently by different class of experts. Based on these...

    QUESTION 5: Information Systems(ISs) can be categorised differently by different class of experts. Based on these categories, Information System types include Transactional Processing Systems(TPSs), Management Information Systems(MISs), Decision Support Systems(DSSs), Executive Support Systems(ESSs) and Entreprise Resource Planning Systems(ERPSs). Using a firm of your choice with reference to various levels of management (operations, middle level & top management) in the firm of your choice, assess the use of TPSs, MISs, DSSs, ESSs and ERPSs in the firm and how they integrate...

  • Case Study: The marketing manager of an airline company is looking at travel habits of business...

    Case Study: The marketing manager of an airline company is looking at travel habits of business travelers. She noticed that business travelers tend to book just few days before flying, unlike economy who book far in advance. In fact, some business travelers may book as late as few minutes before flying. She wants a decision support system based on past bookings that can predict how many business class bookings are likely to happen as these are hard to guess. The...

  • The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand...

    The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand online. It is headquartered in Manhattan, New York. Their on-line application that allows its customers to access video content is currently running on their data center and comprises of the following tiers: a Microsoft SQL Server Database, a Web Front-End on a Windows Server with IIS, and a File System-based content store for image and video files. In addition, the company uses internally...

  • Case (ABC Company): ABC is an IT company specialized in developing web-based and mobile applications. Each...

    Case (ABC Company): ABC is an IT company specialized in developing web-based and mobile applications. Each application is custom designed according to customer requirements. Project managers are assigned to each project only after the sales department has a signed contract. The project managers can come from anywhere within the company. The assigned project managers can be responsible for as many as seven projects at one time. In the past, there has not been enough emphasis on project management. At one...

  • We make many decisions throughout our day based on probability. What is an example of something...

    We make many decisions throughout our day based on probability. What is an example of something from your daily life that you choose based on how likely it will happen? How would the probability need to change for you to make a different decision? 1. Hypothesis testing is based on the idea that if there is enough of a difference between your experimental sample and the comparison distribution, you can see the research supports your hypothesis. Describe an experiment in...

  • There are many different ways in which firms can organize themselves: There are flat organizations and...

    There are many different ways in which firms can organize themselves: There are flat organizations and there are tall organizations. There are organizations structured by products, divisions, and geography. But one thing nearly all structures have in common is a chain of command, or hierarchy. Do companies have to set up that way? Tony Hsieh doesn’t think so. Hsieh is the CEO of Zappos, the online seller of shoes. Hsieh is a guy who thinks outside of the box. When...

  • Please find these answers from this book (Management information system) twelfth edition part (IT Infrastructure and...

    Please find these answers from this book (Management information system) twelfth edition part (IT Infrastructure and Emerging Technologies) CASE STUDY QUESTIONS 1. How does Salesforce.com use cloud computing? 2. What are some of the challenges facing Salesforce as it continues its growth? How well will it be able to meet those challenges? 3. What kinds of businesses could benefit from switching to Salesforce and why? 4. What factors would you take into account in deciding whether to use Saleforce.com for...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT