Question: E - Threats mitigation techniques & recommendations ( 1 ) Briefy research what you can do to minimise the threats to the fndings in the
EThreats mitigation techniques & recommendations
Briefy research what you can do to minimise the threats to the fndings in the reconnaissance phase when you tested the web application in section A marks
Briefy research how to prevent your companys servers from revealing too much information when an attacker conducts scanning and enumeration, similar to the activities in section A marks
Briefy research and explain how to protect your database against SQL injection exploited in section B marks
Briefy research and explain how to protect your web application against cross site Scripting attacks exploited in section B marks
Briefy research and explain how to protect your web application against cryptanalysis attacks exploited in section B marks
Investigate what activities a security analyst can carry out to protect, or at least minimize the impact of Man in the Middle attack carried out in section C marks
Research the work that companies should do to ensure that their users do not fall victims to social engineering attacks similar to the attack you carried out in section C marks
Research and explain what companies do to protect their web services against a DoS attack similar to the one you have carried out in section D marks
Intrusion Detection and Prevention systems
Explain the diferences between Intrusion Detection System IDS and Intrusion prevention System IPS. marks
Scenario assessment: Suggest a recommendation for the scenario you have in hand and justify your answer. marks
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
