Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Most cyber-attacks happen because vulnerabilities in system or application softw

ID: 3865137 • Letter: M

Question

Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities. (Refer to both NIST/DHS and MITRE databases of common vulnerabilities (http://nvd.nist.gov/cwe.cfm; http://cwe.mitre.org/top25/).) For this conference, explain what a specific vulnerability is, describe a famous attack that leveraged it (For example, the Morris worm leveraged the buffer overflow vulnerability), and how it can be prevented/minimized. Your post can either discuss a vulnerability that has not been discussed, or expand upon what someone has already posted. I encourage multiple postings by an individual.

Explanation / Answer

vulnerability explains the circumstances and characteristics of a system that make it susceptible
to the damaging effects of a hazard.
There are four vulnerability:
1.Physical
2.Social
3.Environmental
4.Economic
steps can be taken to reduce the risk and vulnerability.
Vulnerability assessments allow for the identification of areas of
critical concern and help to mitigate the efforts.
National Oceanic and administration has been developed to mitigate

the risks.

Buffer over flow is a software security vulnerability.
This buffer over flow can attack against newley developed
applications.
Buffer overflow are difficult to discover.
The safety of the code depends on user by entering fewer
than BUFSIZE characters.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote