Question

In: Computer Science

Assuming that we had to place our current Yoga Application into production, with the addition of...

Assuming that we had to place our current Yoga Application into production, with the addition of the firewall we installed, identify THREE (3) significant and distinct areas for which our application and its environment is still vulnerable, and list some possible ways we would need to protect those vulnerabilities? Be sure to be specific, thorough, and use critical thinking. Imagine this is for your boss, and your job depends on it, but keep it limited to just three paragraphs. Each paragraph should clearly list a VULNERABILITY and at least one MITIGATION for each. Expected length: 3 well-formed but concise paragraphs.

Please I need help asap... Thanks!!!!!

Solutions

Expert Solution

Hi, I would like to answer you out with this question. I hope you will be getting a clear idea related the same . So lets head towards the answer.

Three different ares where the appication is still vulnerable with their mitigations are:

  • DDOS on Web server - We assume that the Yoga application is a web application and here the web server may be vulnerable to the DDOS (Distributed Denial Of Service) attacks . As inside the DDOS the payloads are been coming from different ip and the firewall could not detect it at all and do not filters the incoming packet inside the network.
  1. Mitigaton - Use of IDS and IPS should be three inside the network enabled
  • Spoofing on the Email Server - The email spoofing is the type of social engineering attack which may be done at the users inside the network. This may be as the email may look like coming from a legitimate source asking for some crucial data and may lead to the leak in the privacy or security of the network.
  1. Mitigation - Use of security protocols on the email server must be configured such as SPF and DMARC
  • SQl injection on the database - This may lead to the envasion inside the database from the client side and from anywhere if the vulnerability is present  and the attacker migh dump the databse and get the full data of the particualar database just by using some commands.
  1. Mitigation - Always filter the input from the user and do not accept special characters inside the input filed wherever not needed and filter the inputs with the character codes.

So these are three different aspects which may be vulnerable for the application .

Hope you like an answer , please like an answer and do comment for any queries.

Thanks and Happy to help :)

HAPPY LEARNING


Related Solutions

Is our society truly facing an "energy crisis", assuming by this term we mean that we...
Is our society truly facing an "energy crisis", assuming by this term we mean that we are running out of energy? What is happening to our energy resources as a result of the increasing industrialization of the world?
As a society, we assure the health of our public through the application of a comprehensive...
As a society, we assure the health of our public through the application of a comprehensive public health framework that starts with gathering information about families, communities, systems, and the population. How is this information gathered? What type of information is needed? How is the information used?
During the current year, Skylark Company had operating profit of $150,000. In addition, Skylark had a...
During the current year, Skylark Company had operating profit of $150,000. In addition, Skylark had a long-term capital loss of $10,000. Toby is the sole owner of Skylark Company. Please answer the following. Be sure to label each answer with the identifying number of the question. You can separate each answer with a comma. Type the word none is the amount is zero. Do not enter the number 0 or you will be marked wrong! Scenario 1: Skylark is a...
In addition to the principles we have brought to bear on our conversations and decision-making, some...
In addition to the principles we have brought to bear on our conversations and decision-making, some ethicists insist that principle-based ethics, while important, are not completely adequate. “Medical ethics has placed undue emphasis on the autonomy of patients while neglecting social contexts and responsibilities. [The author] proposes an ethic of caring arising from women's experience that embraces the concrete reality of patients as embodied persons. This ethic of caring is rooted in a Western spiritual tradition that believes in a...
21st century concerns about our place in global communities and the challenges we face
21st century concerns about our place in global communities and the challenges we face
We wish to test whether or not there is a difference between two of our production...
We wish to test whether or not there is a difference between two of our production lines in terms of the defect rate. We examine 400 products on Line A and find that 40% are defective, whereas we examine 100 products on Line B and find that 20% are defective. What is the appropriate test statistic here?
We have had Paige & Gentry as our auditors for many years, haven’t we, Jane? They...
We have had Paige & Gentry as our auditors for many years, haven’t we, Jane? They have been here since I became president two years ago.” “Yes, Bob, I have been the Chief Financial Officer for seven years, and they were here before I came. Why do you ask?” “Well, they were really tough on us during the recent discussions when we were finalizing our year-end audited statements—not at all like I was used to at my last company. When...
How can we save energy in our place of work / study or home? Talk about...
How can we save energy in our place of work / study or home? Talk about the following sub-topics: Current problems with energy consumption Possible alternative sources of energy (large scale ideas) Other ways of reducing consumption (small-scale ideas) Summary and conclusions
Assuming Target’s industry had an average current ratio of 1.0 and an average debt to equity...
Assuming Target’s industry had an average current ratio of 1.0 and an average debt to equity ratio of 2.5, comment on Target’s liquidity and long-term solvency.
Discuss the application of the Production Function concept within either your current business or one with...
Discuss the application of the Production Function concept within either your current business or one with which you are familiar. How does the company determine the rates of production which are the most efficient and the least cost? What method(s) do they use?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT