Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Web and Database Attacks Responses

Web and Database Attacks Responses

Web and Database Attacks Responses
Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
Describe at least three web server vulnerabilities and how they are typically exploited.
For this week, I want to mention and briefly describe three different attacks and why I think they are some of the more commonly used attacks. I do not know the actual answer for which attacks are used the most, but these are commonly used attacks. The first one would be SQL attacks or injections. This was used much more in the past where most web sites did not know how to prevent these from happening. Now most web sites use input validation to prevent SQL injections, but you can still use SQL to attack. When you do a SQL injection, you are inputting code normally with the attempt to either create, alter, delete, or crash that area.
The second one I will mention, I believe is probably most commonly used and that is user errors. You can exploit a vulnerability, by exploiting the biggest vulnerability, which is people. This could be done by phishing or other methods where you could gain access through users misuse or pretending to be higher level workers within a company to obtain information or credentials that you should not have. I understand that this may not be considered a web server vulnerability, but I think it could be considered one.
The last web server vulnerability I would say is when there are errors in the script. When a website is established, there is a script or several written for that website. There are more than likely errors in the script, no matter how good you are at writing script, you will likely have errors, which is why you should test your scripts. More times than not, you will have errors that malicious users could exploit to gain access to your network.
RESPONSE 2:
The three web server vulnerabilities that I will be discussing are SQL injection, cross-site scripting (XSS), and distributed denial of service attacks (DDoS).
A SQL injection is a code that is typically used to access information that is not intended for the public (Imperva, 2020). According to Imperva, “”¦ information may include any number of items, including sensitive company data, user lists or private customer details (2020). A way that it can be exploited is by manipulating the query and receiving different information that what was searched (Prodromou, 2019).
The XSS can be sent to another user and disguise itself as a trusted site. Sensitive information can be accessed when the XSS is injected into the other user (KristenS, n.d.)
A DDoS attack is typically done when it overwhelms a system with internet traffic. The overflowing amount of internet traffic interrupts servers, networks and services (Cloudflare, 2020). The attacker must gain control of the network they want to target in order to successfully attack.
Noemi
References
Clouddlare. (2020). “What is a DDoS attack?”. Retrieved from https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Imperva. (2020). “What is SQL Injection”. Retrieved from https://www.imperva.com/learn/application-security/sql-injection-sqli/
KristenS. (n.d.). “Cross Site Scripting (XSS)”. Retrieved from https://owasp.org/www-community/attacks/xss/
Prodromou, A. (2019). “Exploiting SQL Injection: a Hands-on example”. Retrieved from https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/

“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Blackboard Experts only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Blackboard Experts are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Blackboard Experts is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Blackboard Experts, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.