CS 410 6-1 Journal

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by BailiffSpider1312

Report
Koehler Radder 06-07-2023 CS 410 6-1 Journal A security vulnerability is a weakness or flaw in a system, network, software, or application that can be exploited by malicious actors to gain unauthorized access, disrupt normal operations, or cause harm. Vulnerabilities can exist in various components of a system, such as hardware, software, firmware, configurations, or even human factors. When a vulnerability is successfully exploited, it can lead to a wide range of security breaches, such as unauthorized access, data breaches, system crashes, or the execution of arbitrary code. To mitigate vulnerabilities, organizations typically rely on regular security assessments, vulnerability scanning, penetration testing, and implementing security best practices. Software developers and vendors also play a crucial role in addressing vulnerabilities by releasing patches, updates, and security fixes. There are several kinds of vulnerabilities that would be identifiable in C++ code. The first being buff overflow, this is a vulnerability where a program writes data beyond the bounds of a buffer, potentially overwriting adjacent memory areas, leading to crashes, data corruption, or attackers executing arbitrary code. Another vulnerability would be Format String Vulnerabilities, Attackers can exploit this vulnerability by using user-supplied input as a format string without proper validation or sanitization, leading to information disclosure or code disclosure. The last
example is Injection Attacks, C++ code that interacts with external resources may be vulnerable to injection attacks, such as SQL injection, command injection, or LDAP injection. It is important to search for vulnerabilities during the conversion of legacy code to C++ in order to detect any potential security risks. Legacy code is often written in an older language and may not be compatible with the new language, so it is important to determine if there are any security issues related to these libraries. I would determine the appropriate fix to a security vulnerability by using Open Web Application Security Project or OWASP. OWASP is a non-profit organization that provides resources to help organizations and individuals build secure applications. It is a standard set of security guidelines and practices used by software developers and IT professionals to protect computer systems from cyber threats. It provides a comprehensive list of security best practices and tools to identify, prevent, and mitigate vulnerabilities in applications and systems.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help