Lab #5 - Assessment Worksheet

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

8

Uploaded by cheyennemaxey97

1. It is important so that you can expose and correct any existing security flaws. 2. Cross-site scripting is a way for a hack to target an individual by implanting a “bug” (unregulated materials) into a website or application that is otherwise trustworthy. 3. Reflective cross-site scripting can be links for reviews of items you’re interested in purchasing. 4. Based on the tests performed, the SQL injection has the best means to extract the desired data. 5. I would implement rules against the tolerable functions of an SQL database. 6. Search for known vulnerabilities and correct them accordingly.
7. Implement a policy of forward-thinking information security using penetration testing. 8. The purpose of this is to demonstrate how the server will react without proper security measures.
Section 1 Part 2: Part 2 step 9: In the high setting the cross-site scripting is still readable. Meaning there is not an ability to encode things for malicious intent. Part 2 step 10: There are at least 2 columns in the databases structure.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help