Question

In: Computer Science

Application security is one of the primary avenues used by attackers to penetrate systems and networks....

Application security is one of the primary avenues used by attackers to penetrate systems and networks. Some of these avenues still being exploited have been known for decades. There has historically been a wide gap between application developers and security professionals—a gap that more organizations are becoming motivated to bridge.

Discuss the following:

  • Differentiate between object-based and object-oriented computer code.
  • Identify common avenues of vulnerability specific to application security.
  • Explain strategies that mitigate application security vulnerabilities.

Solutions

Expert Solution

Answer)

The object-oriented language mostly supports all of the features of that of OOPS which has abstraction, along with inheritance, or polymorphism or encapsulation whereas Object based language would not support every feature of the OOPS like that of polymorphism or the inheritance.

Some of the vulnerability specific to that of the application security is the cross-site scripting, or the SQL injection or that of the LDAP injection etc. There should be vulnerability management like reducing the risk involved by identifying those, or use of scanning tools etc

Some of the best strategies involved are as mentioned below:

1) To lower the risk that one is exposed to

2) To plan, integrate, design or finally implement the risk management or compliance process

3) To be aware of new or any upcoming threat and enhance the security accordingly

4) To have a bench mark of the business service levels.

Please comment in case you need any other inputs.
Please share a like if you find the answer helpful.
Thank you.


Related Solutions

a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.
a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.  b) An ethical dilemma is a situation a person faces in which a decision must be made about appropriate behavior. Discuss any five key professional ethical values to be considered when faced with ethical dilemma at the work place. c) Jeremy Bentham (1748-1832) once said “The greatest goal is to achieve the greatest happiness for as many people as possible.” Clearly explain what he...
Question about networks and 5G. Millimeter waves can be used for 5G cellular systems. What are...
Question about networks and 5G. Millimeter waves can be used for 5G cellular systems. What are some challenges we may face if millimeter waves are used for communication?
Consider Unix, Linux, MacOS, Android and Windows operating systems. Consider the primary application of each in...
Consider Unix, Linux, MacOS, Android and Windows operating systems. Consider the primary application of each in the marketplace. How does each OS implement threads? How does the usage of threads impact application (usage) ?
describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
Select one area of risk related to auditing operating systems and networks: Describe the threats associated...
Select one area of risk related to auditing operating systems and networks: Describe the threats associated with the risk area. What are the associated controls to address and reduce the likelihood of these threats? What are the audit objectives related to these controls? List the appropriate audit procedures to test these controls?
7. Describe one real-world application of chemical systems in equilibrium. Clearly state the application and state...
7. Describe one real-world application of chemical systems in equilibrium. Clearly state the application and state how the knowledge of chemical systems has helped to make the process possible and / or easier. Then state the impact on the environment or on society
Describe one application where a biodegradable polymer has been used, and contrast this to an application...
Describe one application where a biodegradable polymer has been used, and contrast this to an application where a biostable polymer has been used. Your answer should be a comprehensive account of each application, with diagrams if appropriate, with a specific focus on the characteristics, of the relevant polymer category, that make them suitable for the application. (Maximum 750 words )
Discussion Database Security and UML Often, systems have only one level of security when it comes...
Discussion Database Security and UML Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the database management system (DBMS) or the application level. Where would you apply security? Justify your choice. What are some alternative practices or standards of...
Write a JavaFX multiple stage application which has at least two stages, a primary one and a secondary one.
JavaFX Two-Stage ApplicationWrite a JavaFX multiple stage application which has at least two stages, a primary one and a secondary one.The primary stage should have a gridpane which has at least a 2*3 grid.On each cell of the grid, please place a different node from at least one of the three types: a UI control or a shape or an image view, etc.On the secondary stage, you should design a layout with binding property.Your overall project design should reflect a...
Describe one primary and one secondary data source that could be used in developing a public...
Describe one primary and one secondary data source that could be used in developing a public program. Describe the pros and cons of using each data source.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT