CYB 240 Module Four Lab Worksheet Shane Mallory

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by JudgeSquirrelPerson759

Report
CYB 240 Module Four Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Remote and Local Exploitation Prompt Response In the lab section “Privilege Escalation,” Step 8 , insert your name at the command line below the output and include it in your screenshot. Privilege escalation is a topic that is recurring throughout cybersecurity. What does the term mean, and why should security specialists be concerned about it? Privilege escalation is a method used by threat actors to gain unauthorized access to a system's functions and/or data, and often involves exploiting a bug present in the network or system. Security specialists should take extra care in reducing the chances of this vulnerability being exploited as depending on its severity it can cause irreversible harm to a network or system. Once an attacker has gained elevated privileges they can bypass security controls, manipulate or delete sensitive data, and if given enough time, establish persistent access to the compromised system.
Lab: HTMLi Vulnerability and Mitigation
Prompt Response In the lab section “Analysis of the Vulnerability,” Step 21 , insert your name at the command line below the output and include it in your screenshot. In the lab section “Verifying the Control Works,” take a screenshot after Step 4 . Like any other language, PHP eventually has deprecated commands. How can webpages or other web applications mitigate the risk of Mitigating the risks associated with deprecated code can be a complex task, but numerous strategies can be implemented to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Citations: CrowdStrike. (2023c, November 8). What is Privilege Escalation? - CrowdStrike . crowdstrike.com. https://www.crowdstrike.com/cybersecurity- 101/privilege-escalation/ Grist, R. (2020, April 2). Why do some HTML elements become deprecated? | CSS-Tricks. CSS-Tricks . https://css-tricks.com/why-do-some-html- elements-become-deprecated/