see attached

see attached

You recently took a position as a Cyber Security Analyst for a small software company. The software company currently has three commercially available off-the-shelve software products that are sold to businesses and/or organizations (B2B). They can range from small companies to very large companies including those in the Fortune 500. One of their products has been identified by CERT to have several vulnerabilities. Since this event occurred, the Chief Cyber Security Officer (CCSO) suspects that not enough security is built into the software development process used at the company. You have been asked by the CCSO to conduct a cyber attack surface analysis on one of their web-based products in an effort to improve the software development process.

 

 

Solution Preview

The security risks for applications is perverse thereby posing a direct threat to the organization’s processes (Medeiros, Neves & Correia, 2016). Although this is not a standalone security protocol, it elevates the risks for denial of service attacks. Web applications such as browsers are products developed by the software company. Notably, the applications are the primary tools used in accessing, communicating and transforming information (Medeiros, Neves & Correia, 2016). In the wake of the recently identified vulnerabilities, the cyber-attack surface analysis for the web applications (browser) seeks to explore the vulnerabilities that can compromise their functionalities.

(662 words)

Open chat
Hello
Contact us here via WhatsApp