subject

Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into the company, and she’s heard that you have some cybersecurity skills that could prove useful. Cindy suspects that there are some hackers who are using SQLi to launch attacks and steal information from one of the databases and also to hijack users’ sessions and take over certain accounts. Can you use your cybersecurity penetration testing skills with SQLi to track down the hackers? Cindy will need for you to submit a report with recommendations on your findings, which is pretty typical for others in your industry with this type of role.
Write a security assessment report that will be sent to the technical team and senior management, and specifically Cindy, the CTO. Your report should be approximately 3 pages and address the following:
Summary of Findings (overview of vulnerabilities found)
Types of tests used (with details on outcomes)
Impact of Threats
How any parts of the CIA Triad could be compromised with the vulnerabilities
Does OWASP have any recommendations that you can apply?
Executive Summary (what recommendations would you give to the CTO)

Present potential solutions, mitigations, or other
suggestions for reducing or eliminating the vulnerability

(On CodeHS)

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 13:30
Best laptops for college [$100-$500 range]?
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
1. ask the user how many questions are in the quiz. 2. ask the user to enter the key (that is, the correct answers). there should be one answer for each question in the quiz, and each answer should be an integer. e.g., 34 7 13 100 81 3 9 10 321 12 might be the key for a 10-question quiz. you will need to store the key in an array. 3. ask the user to enter the answers for the quiz to be graded. there needs to be one answer for each question. note that these answers do not need to be stored; each answer can simply be compared to the key as it is entered. 4. when the user has entered all of the answers to be graded, print the number correct and the percent correct. 5. add a loop so that the user can grade any number of quizzes with a single key. after the results have been printed for each quiz, ask "grade another quiz? (y/n)." note: you only have one array (the key). you are not creating a new key for each set of quiz answers.
Answers: 3
question
Computers and Technology, 23.06.2019 16:00
Kenny works with an it company. his company is about to launch new software in the market. he has to ensure that this new software is functional and meets all of the quality standards set up at the planning stage. which job profile is kenny likely to have? kenny is likely to have the job profile of a blank .
Answers: 2
question
Computers and Technology, 24.06.2019 09:50
Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the web pages for a particular vendor (say amazon). a. how can you use this data to determine which are the best ads? b. how can you use this data to determine which are the best ad formats? c. how could you records of past ads and ad clicks to determine which ads to send to a given ip address? d. how could you use this data to determine how well the technique you used in your answer to part c was working? e. how could you use this data to determine that a given ip address is used by more than one person? f. how does having this data give you a competitive advantage vis-à-vis other ad-serving companies?
Answers: 2
You know the right answer?
Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into th...
Questions
question
Chemistry, 05.05.2020 15:16
question
Social Studies, 05.05.2020 15:16
question
Mathematics, 05.05.2020 15:16
question
Mathematics, 05.05.2020 15:16
question
Mathematics, 05.05.2020 15:16
question
Geography, 05.05.2020 15:16
question
Mathematics, 05.05.2020 15:16
Questions on the website: 13722363