CYB-240_ModuleFourLabWorksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by DeanGoldfinch4081

Report
CYB 240 Module Four Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Remote and Local Exploitation Prompt Response In the lab section “Privilege Escalation,” Step 8 , insert your name at the command line below the output and include it in your screenshot. Privilege escalation is a topic that is recurring throughout cybersecurity. What does the term mean, and why should security specialists be concerned about it? Privilege escalation is when an attacker gains access to a network at a higher level. They may gain access to a network through a lower level employee, but use methods to escalate privilege to a level of access reserved for higher level employees or IT admin. This is concerning because if an attacker is able to escalate privilege they will, presumably, have access to more sensitive information. For instance, if an attacker gains access through an entry level accountant’s system, they may not have access to much financial information, but if they are able to escalate privilege to the level of the CFO, the attacker would likely then have access to all the financial information including account numbers.
Lab: HTMLi Vulnerability and Mitigation Prompt Response In the lab section “Analysis of the Vulnerability,” Step 21 , insert your name at the command line below the output and include it in your screenshot. In the lab section “Verifying the Control Works,” take a screenshot after Step 4 . Like any other language, PHP eventually has deprecated commands. How can webpages or other web applications mitigate the risk of having deprecated code in the code base that can be exploited? They would have to review the code and remove dependency on the deprecated code then update the code accordingly. CodeLogic and other vendors provide dependency mapping to help pinpoint deprecated code and offer a full overview of the dependencies. If the dependencies aren’t removed before updating the code it could cause bigger issues. (Deprecated Code: How Dependency Mapping Can Prevent Headaches, n.d.)
References Deprecated Code: How Dependency Mapping Can Prevent Headaches . (n.d.). From CodeLogic: https://codelogic.com/blog/codelogic- deprecated-code/#:~:text=Using%20dependency%20mapping%2C%20teams%20can,focus%20on%20more%20constructive %20projects.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help