Learn smart - Learn online. Upto 80% off on courses for a limited time. View Courses
New User? Start here.
Error goes here
Please upload all relevant files for quick & complete assistance.
Running head: DISCUSSION Discussion Name of Student Name of University Author Note DISCUSSION 1 One of the ...
Running head: DISCUSSION Discussion Name of Student Name of University Author Note DISCUSSION 1 One of the most significant changes since 2013, is the change in fundamental technology and architecture of the application. The use of microservices is seen to be prevalent and creation of highly modular feature -rich front ends is seen. Along with that, J avascript has been set to be the primary language along with the .js running server side coupled with modern frameworks such as Bootstrap, electron etc . (OWASP, 2017 ). The insufficient logging, detection, monitoring and active response can occur any time and failed login can significantly increase the overall risk factors and hence this particular risk or issue is required to be prevented. This particular risk can be prevented by ensuring the fact that all login and access control failures have sufficient u ser to identify and detect occurrences of any suspicious activities. Based on the discussions occurred in the class so far, I could understand the fact that threat agents act as an attack vector and hence continuous monitoring of the threats in a particul ar network is a necessity. The threat vectors look for the security vulnerability in a system and hence proper security monitoring is needed to be enforced. One of the easiest ways of identifying a security vulnerability is penetration testing (OWASP, 2017 ). Apart from that effective security monitoring and control is necessary to be enforced to reduce any type of significant risks related to intrusion . The inefficiency of the log files can be easily identified through penetration testing and hence, it is necessary for the developers to perform such tests on the log files to identify the threats associated with the same (Huang et al., 2017) . It is the easiest method to prevent a risk or eliminate the risk from its source. DISCUSSION 2 References Huang, H. C., Zhang, Z . K., Cheng, H. W., & Shieh, S. W. (2017). Web application security: threats, countermeasures, and pitfalls. Computer , 50 (6), 81 -85. OWASP, T. (2017). Top 10 -2017 the ten most critical web application security risks. URL: owasp. org/images/7/72/OWASP_Top_1 0-2017_% 28en , 29 .
Enter the password to open this PDF file:
MyAssignmenthelp.com functions as one-stop solutions of all types of assignment related queries. Expert writers associated with MAH deliver assignment help online in the fastest way possible. With assignment writing help, we have different teams of editors who provide assignment editing and proofreading assistance as well. For students who often wonder, who can do my assignment online or search the internet with the search term like write my assignment online, we provide one stop answer to all their assignment related issues. For our extensive range of services, students prefer to buy assignment from us at cheap rates.
On APP - grab it while it lasts!
*Offer eligible for first 3 orders ordered through app!
ONLINE TO HELP YOU 24X7
OR GET MONEY BACK!
OUT OF 38983 REVIEWS
Received my assignment before my deadline request, paper was well written. Highly recommend.