Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Using the readings from weeks 7 and 8 as a baseline, analyze, test and document the results for the tutoring web application found on the SDEV virtual machine. The latter will enable you to discover more information than a cursory manual examination. Specific tests to be conducted include:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

What is the importance of testing for this vulnerability?

How many occurrences of the vulnerability did an automated scan discover?

What is your recommendation to address any issues?

Can you place a simple JavaScript alert (e.g., DeleteSession.php as an example)?

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

What is the importance of testing for this vulnerability?

What happens when you attempt to add a pop-up window (e.g., ) to the email input field within the "index.html" field?

Can you introduce Stored Cross site scripting?

3. Testing for SQL Injection (OTG-INPVAL-005)

Did your manual and automated testing discover any SQL Injection vulnerabilities - if so, how many? (Note: There should be at least one occurrence).

Name two or more steps you can take according to the reading to resolve the issue.

Fix and test at least one occurrence of the vulnerabilities - displaying your resulting source code and output results.

4. Testing for Code Injection (OTG-INPVAL-012)

What is the importance of testing for this vulnerability?

What are at least two measures you can take to remediate this issue?

Can you input some simple html code or exploit Remote File Inclusion (RFI)?

5. Test business logic data validation (OTG-BUSLOGIC-001)

What are at least two examples of business logic errors? This could be from various input forms or areas you discovered in previous HW assignments.

How can you mitigate against such errors?

6. Test integrity checks (OTG-BUSLOGIC-003)

Do Drop down menus exist and are they sufficient for the application? Why does the use of drop-down menus help mitigate against this risk?

Does your manual or automated scan reveal the use of password "AUTOCOMPLETE"? What issue, if any, does the use of AUTOCOMPLETE pose?

7. Test defenses against application misuse (OTG-BUSLOGIC-007)

What is the importance of testing for this vulnerability?

Can adding additional characters in input fields cause unexpected results? Verify for at least two instances.

General Guidelines

You should document the results for the tests, your comments, and recommendations for improved security for each security control tested in a word or PDF document.

The format of your document should be the format that is recommended in chapter 5 of the OWASP testing guide. Provide screen captures and descriptions of your tests conducted. Discuss any issues found and possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, use the OWASP recommended reporting format, include all references used and contain minimal spelling and grammar errors.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92489155
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Management Information System

You are hired as a chief technology officer cto of a

You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the product. As CTO, ...

Singulation is the process by which an rfid reader

"Singulation" is the process by which an RFID reader identifies and communicates with a single RFID transponder. Two singulation methods are tree-walking and an Aloha MAC. Which method is preferable in a densly populated ...

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

Question suppose that you enhance an architecture by

Question : Suppose that you enhance an architecture by replacing its floating-point divider with a new hardware divider on which division is 15 times faster. For your application code running on the original hardware, 2% ...

Question how does the role of operations vary across the

Question : How does the role of operations vary across the four types of e-Businesses namely e-marketplace, e-service, e-retailers and wholesalers, and e-producers? Suggest some possible performance measures that could b ...

Assignment 1resources chapter 11 in the spirit catches you

Assignment 1 Resources: chapter 11 in The Spirit Catches You and You Fall Down that discusses Hmong read the chapter in its entirety. Each team member should take notes and call out important details of Hmong history and ...

Systems analysis design uml version 20 4th edition textbook

Systems Analysis Design UML Version 2.0 4th Edition textbook (Your Turn 8-2) Create a set of discussion points that you will use to explain to your development team the importance of optimizing the design before jumping ...

Task description data engineering and mining the data set

Task description: Data Engineering and Mining The data set comes from the Kaggle Digit Recognizer competition. The goal is to recognize digits 0 to 9 in handwriting images. Because the original data set is large, I have ...

Write a 700- to 750 word paper on the protocols used in the

Write a 700- to 750 word paper on the protocols used in the OSI model. Address the following points: 1. How protocols are used to allow data communication to take place 2. How these protocols apply to health care organiz ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As