Web Threats/ Malicious Activity For this assignment, write a 3–5 page report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the...

1 answer below »
Assignment is attached


Web Threats/ Malicious Activity For this assignment, write a 3–5 page report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully developed explanations, address each of the following: 1. Explain the immediate steps you would instruct your team to use to contain the attack while maintaining the service to the e-commerce site. 2. Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified.  3. Evaluate the OWASP Top 10 – 2017: The Ten Most Critical Web Application Security Risks [PDF], and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk. Note: APA References, please use recent US creditable references Grading Rubric
Answered 2 days AfterJul 27, 2021

Answer To: Web Threats/ Malicious Activity For this assignment, write a 3–5 page report to the new CEO....

Deepti answered on Jul 30 2021
159 Votes
Contents
Network Distribution    1
Steps to contain the attack    1
Strong Password usage    1
System alerts for suspicious activity    1
Layered security    1
Security Training    1
Regular monitoring    1
Regular PCI scanning    1
Patching    1
Intrusion Detection and Protec
tion System    2
Backup and Disaster Recovery Plan    2
Vulnerabilities and Threat Mitigation    2
Predictable Resource Location    2
Abuse of functionality    2
HTTP Response Splitting    2
Mitigation Strategy    3
References    3
Network Distribution
The network distribution is done such that the infrastructure can handle the traffic. Business and finance teams were involved with the IT security team to ensure that they do not work silos. The diagram below shows a generic design of how the website network has been setup.
The following steps will ensure that the website network is secured.
· Locate router settings and create password for the router.
· Network SSID name should be changed.
· Enable network encryption and filtering out Mc Address.
· Reducing wireless signal range to appropriate distance.
· Upgrading firmware, installing firewall and connecting to secure wireless network.
Steps to contain the attack
Strong Password usage
The team should use strong passwords for all devices. Characteristics like minimum number pf characters, mixed case of letters, numbers and special characters should be used to increase password strength making it hard to guess.
System alerts for suspicious activity
Alerts like admin email alerts, activity monitoring alerts and notifications should be turned on. Email alerts should be sent in cases like a compromised mobile device is detected, suspicious sign-in attempt is detected or an admin changes system settings. User activities should be monitored to allow incident response team to detect and analyze issues and respond quickly.
Layered security
Team should strive to protect multiple components on multiple levels. Every defense component should have a backup to counter any flaws in other defenses. The levels include firewall threat management, end user protection, email filtering, email archiving, email encryption, web filtering, data encryption, mobile device management and security.
Security Training
According to the major risks, assessments should be made and training content should be developed to tackle them. This content should be scheduled and delivered through different methods like email lists, intranet. The resources should be kept updated. Small grouped sessions shall be fruitful to offer the employees to ask questions and resolve their queries. It is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here