Computers and Technology

Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into the company, and she’s heard that you have some cybersecurity skills that could prove useful. Cindy suspects that there are some hackers who are using SQLi to launch attacks and steal information from one of the databases and also to hijack users’ sessions and take over certain accounts. Can you use your cybersecurity penetration testing skills with SQLi to track down the hackers? Cindy will need for you to submit a report with recommendations on your findings, which is pretty typical for others in your industry with this type of role.
Write a security assessment report that will be sent to the technical team and senior management, and specifically Cindy, the CTO. Your report should be approximately 3 pages and address the following:
Summary of Findings (overview of vulnerabilities found)
Types of tests used (with details on outcomes)
Impact of Threats
How any parts of the CIA Triad could be compromised with the vulnerabilities
Does OWASP have any recommendations that you can apply?
Executive Summary (what recommendations would you give to the CTO)

Present potential solutions, mitigations, or other
suggestions for reducing or eliminating the vulnerability

(On CodeHS)

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:30, jonquil201
Where would you click to edit the chart data?
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, lexirandall19
Define a function printfeetinchshort, with int parameters numfeet and numinches, that prints using ' and " shorthand. ex: printfeetinchshort(5, 8) prints: 5' 8"
Answers: 1
image
Computers and Technology, 23.06.2019 22:30, delawdermia27
The output voltage of a power supply is assumed to be normally distributed. sixteen observations are taken at random on voltage are as follows: 10.35, 9.30, 10.00, 9.96, 11.65, 12.00, 11.25, 9.58, 11.54, 9.95, 10.28, 8.37, 10.44, 9.25, 9.38, and 10.85
Answers: 1
image
Computers and Technology, 25.06.2019 03:00, reearamrup27
Match the categories in the first column with examples in the second column. 1. good for watching movies 2. maximum power with small size 3. older style mobile devices that may or may not have internet connectivity tablet computer a.)pda b.)smart phone c.)tablet computer
Answers: 1
Do you know the correct answer?
Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into th...

Questions in other subjects: