ISSC457_Week2_Assignment_Ocasio_Miguel

doc

School

American Military University *

*We aren’t endorsed by this school

Course

457

Subject

Business

Date

Feb 20, 2024

Type

doc

Pages

2

Uploaded by ocasio703

Report
ISSC457 Week 2 Assignment Name: _______Miguel Ocasio__________________ Date: 01/14/2024_____________ Fill in your name above, put your full response below each question, save the file using the file naming convention: ISSC457_Week2_Assignment_LastName_FirstName.doc ” where LastName is your last name and FirstName is your first name, then return this document for grading. Upon completing lesson 2 reading, you should be able to provide information regarding the below question. Assignment Rubric ( 100 Points) Synthesis of Concepts 60 Writing Standards - APA format 20 Timeliness 20 1. What are the strategies to secure Web applications? Session Management: Use secure session management practices, such as session timeouts and secure cookies. Cookie flags should be implemented for HTTP Only and Secure. Input Validation: Validate and sanitize user input to prevent attacks like SQL injection. In order to avoid SQL injection vulnerabilities, parameterized queries must be used. Security Awareness Training: Promote security awareness among stakeholders by training developers and staff. Incident Response Plan : Prepare an incident response plan to ensure security incidents get handled effectively. Firewall and Intrusion Detection: Filter and monitor HTTP traffic with web application firewalls (WAFs) and intrusion detection/prevention systems. Monitoring and logging: Track and respond to security events with comprehensive logging. Penetration Testing: Identify and address vulnerabilities proactively by conducting regular penetration tests. 2. Why are WHOIS tools important? Using WHOIS tools, you can find out who owns a domain, who is contacting them, and when it was registered. Transparency is key to ensuring accountability and verifying legitimacy. Law enforcement and security professionals use WHOIS data to investigate cyber threats. As well as protecting intellectual property, monitoring trademark infringements, and resolving domain disputes, these tools help businesses and
ISSC457 Week 2 Assignment individuals. It helps network administrators troubleshoot and maintain network health, while businesses use it for competitive intelligence and compliance. It also helps prevent fraud, identify fake sites, and ensure legal compliance. WHOIS tools play a big role in promoting transparency, cybersecurity, and effective domain management. Reference: DomainTools. (2022a, August 21). What is WHOIS information and why is it valuable? - domaintools: Start here. know now. https://www.domaintools.com/support/what-is- whois-information-and-why-is-it-valuable/ Career Technology Cyber Security India Pvt. Ltd. (2023a, November 21). Whois. Medium. https://medium.com/@careertechnologymiraroad/whois-be67ec1f5874 IBM. (n.d.). Mobile threat defense (MTD) solutions - IBM security maas360. https://www.ibm.com/products/maas360/mobile-threat-defense? utm_content=SRCWW&p1=Search&p4=43700077194459299&p5=p&gclid=CjwKCAi AqY6tBhAtEiwAHeRopfqzHb6iLHeLy9JCoNGdHSkWPTPMbXRvcBix8iCHM64IvZ GLAgDEeBoChxwQAvD_BwE&gclsrc=aw.ds Nidecki, T. A. (2024, January 9). 7 web application security best practices. Acunetix. https://www.acunetix.com/blog/web-security-zone/7-web-application-security-best- practices/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help