(a) Explain the additional security that would be provided by the web api firewall. (b) Discuss any alternative or complimentary technologies that would assist in securing the anplication.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
You are working for an organisation that is using a very old web-based application
that was developed in-house and is only used by members of the organisation. The
leader of the web development team has indicated that the application needs to be
urgently redeveloped as it is dependent upon outdated frameworks that have
recently been found to be vulnerable to SQL injection attacks, however the
organisation is currently short on funding. One of the security team has suggested
using a web application firewall to prevent common attacks instead.
(a) Explain the additional security that would be provided by the web application
firewall.
(b) Discuss any alternative or complimentary technologies that would assist in
securing the application.
Transcribed Image Text:You are working for an organisation that is using a very old web-based application that was developed in-house and is only used by members of the organisation. The leader of the web development team has indicated that the application needs to be urgently redeveloped as it is dependent upon outdated frameworks that have recently been found to be vulnerable to SQL injection attacks, however the organisation is currently short on funding. One of the security team has suggested using a web application firewall to prevent common attacks instead. (a) Explain the additional security that would be provided by the web application firewall. (b) Discuss any alternative or complimentary technologies that would assist in securing the application.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protection Strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education