• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

Question 1

November 13, 2024 by David Lanter 25 Comments

What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?

Filed Under: Unit 13: Computer Application Security Tagged With:

Reader Interactions

Comments

  1. Nelson Ezeatuegwu says

    November 15, 2024 at 8:59 pm

    Web Application is software stored on a remote server and run on a web browser. Desktop application is a standalone software that is installed on a computer, it does not need an internet to be run. Both applications face the risk of unauthorized access. Unauthorized threat actors can get access to both desktop and web application through injection-based attacks like rootkit, SQL injection, cross-site scripting (XXS) etc.
    The unique risk faced by desktop applications usually lies in the design and maintenance, they are designed for specific operating systems and hardware configurations which could lead to compatibility issues. There could be errors during the installation of a desktop server and users are required to manually download and run updates on a desktop server. Web server on the other hand requires internet connectivity which exposes it to more risk because it is accessible to so many users on the internet. The flow of data from the application layer to the physical layer is susceptible to several attacks.

    Log in to Reply
  2. Christopher Williams says

    November 16, 2024 at 3:06 pm

    Desktop and web-based applications both share general risks like unauthorized access and potential data breaches. Attackers may try to exploit weaknesses in the software to gain control or access sensitive information. Desktop applications run directly on a user’s computer, making them more vulnerable to risks like file tampering, malware infections, and local system exploits. Since desktop apps are often tied to specific operating systems, they may also have compatibility issues and need manual updates, increasing the risk of outdated software.
    On the other hand, web-based applications run through a web browser and require internet access, which exposes them to different types of online threats. Because web apps transmit data over the internet, they are also at greater risk from network based attacks that can intercept or manipulate data as it moves between the user and the server.

    Log in to Reply
    • James Nyamokoh says

      November 17, 2024 at 4:59 pm

      Hi Chris,

      I agree with your assessment that desktop and web-based applications face shared risks like unauthorized access and data breaches, while also being exposed to unique vulnerabilities. The points about desktop applications being prone to file tampering and malware, as well as the risks of network-based attacks for web applications, are accurate and well-stated. However, it’s also important to emphasize that web-based applications benefit from centralized patch management, making updates more consistent compared to desktop applications that rely on individual users to install updates. Additionally, the scalability and reach of web applications mean that their vulnerabilities can impact a much larger user base if exploited. Great post.

      Log in to Reply
  3. Andrea Baum says

    November 17, 2024 at 1:30 pm

    Desktop and web applications share risks like malware, unauthorized access, and data breaches. Desktop apps face unique risks such as physical theft, dependence on the operating system, and challenges with updates, while web apps are more exposed to network attacks like DDoS, XSS, and server vulnerabilities. Web apps also handle compliance issues and risks from third party integrations, while desktop apps deal with local file access and unpatched vulnerabilities. Strong authentication, encryption, regular updates, and targeted strategies can help address these risks effectively.

    Log in to Reply
    • Dawn Foreman says

      November 17, 2024 at 10:10 pm

      Hey Andrea,
      You bring up great points! Both desktop applications and web applications have their own inherent risks. As the professor has mentioned, simply owning a computer comes with risk. However, businesses can use security practices such as strong authentication, encryption, and regular updates (as you mentioned) to help mitigate these risks. I think as an ITACS professional, it is imperative to know the risks associated with the applications in use to best know how to mitigate them.

      Log in to Reply
  4. Benjamin Rooks says

    November 17, 2024 at 4:15 pm

    Desktop Application Risks:
    Physical attacks such as shoulder surfing, theft, and more risk from environmental threats. Also can have additional difficulties/risks depending on the platform.
    Web Application Risks:
    Much more susceptible to remote attacks such as DDOS and specific zero day exploits since it can be accessed from any location.
    Risks for both: Both types of applications are venerable to malware and, social engineering.

    Log in to Reply
    • Vincenzo Macolino says

      November 19, 2024 at 6:37 pm

      Hey Benjamin, I pretty much had the same answer. Desktop application risks are physical attacks like theft or risks from environmental threats, while web-based application risks are remote like certain exploits or DDoS attacks. If a company, most likely a small business, was short on resources. Would you suggest them to focus more on desktop application risks, or web-based application risks?

      Log in to Reply
      • Gbolahan Afolabi says

        November 19, 2024 at 10:15 pm

        In an enterprise environment, each application needs to be monitored and configured to the organization’s risk appetite and protocols. Both need to be configured with mechanisms and controls that defend against security breaches. The information security team is perfectly capable of ensuring both have the same level of priority.

        Log in to Reply
    • Brittany Pomish says

      November 19, 2024 at 7:22 pm

      Hi Benjamin – While I left a similar response, I really liked how you mentioned social engineering. It is important to understand that those types of attacks are always a risk, regardless of web application or desktop application.

      Log in to Reply
  5. James Nyamokoh says

    November 17, 2024 at 4:22 pm

    Both desktop and web-based applications face risks like data breaches, code vulnerabilities, and weak authentication. However, desktop applications are uniquely exposed to local threats like DLL hijacking, unauthorized file access, and physical theft of devices, which could compromise sensitive data. On the other hand, web-based applications are particularly vulnerable to network-related attacks like Cross-Site Scripting (XSS), SQL Injection, and Distributed Denial-of-Service (DDoS) due to their online availability. Understanding these unique risks helps organizations prioritize the right security measures for each application type.

    Log in to Reply
    • Nelson Ezeatuegwu says

      November 17, 2024 at 11:58 pm

      Hi James
      Thanks for pointing out that desktop applications are uniquely exposed to physical theft of the device since the application is a standalone software that is installed on a computer.

      Log in to Reply
  6. Cyrena Haynes says

    November 17, 2024 at 4:41 pm

    Both desktop and web-based applications share common risks, such as unauthorized access, data breaches, and vulnerabilities to malware or other forms of cyberattacks. Desktop applications are particularly susceptible to risks related to local storage, such as data loss or corruption from hardware failure, as well as threats from unpatched software or unauthorized modifications to the application on individual machines. In contrast, web applications are more exposed to vulnerabilities in server-side infrastructure, such as database breaches or Denial of Service (DoS) attacks and rely heavily on proper encryption for data transmitted over the internet.

    Log in to Reply
    • Christopher Williams says

      November 19, 2024 at 9:26 pm

      Hi, I like how you compared the risks for desktop and web-based applications. One thing I’d add is how updates play a role in both. Web applications often benefit from centralized updates, making it easier to fix vulnerabilities quickly, while desktop applications rely on users to manually update, which can leave some systems exposed for longer. This difference highlights how the way an application is managed can either increase or reduce its risks. It’s a good reminder that proper maintenance is just as important as the security measures themselves.

      Log in to Reply
    • Tache Johnson says

      November 19, 2024 at 11:18 pm

      Cyrena I like the breakdown of desktop and web app risks is spot on, and Chris, your insight about updates highlights a critical difference in managing vulnerabilities. Centralized updates for web apps reduce exposure, while desktop apps relying on manual updates often stay vulnerable longer.

      Log in to Reply
  7. Vincenzo Macolino says

    November 17, 2024 at 6:14 pm

    There are a few shared risks between desktop and web-based applications, data breaches, malware injection, unauthorized access, and DoS attacks. The unique risks that web-based applications face include physical security like tampering or theft, as well as the loss of data storage on a device, usually local. Lack of network connectivity can make security updates and monitoring less effective for desktop applications. Unique risks for web-based applications include attacks like SQL injections, and cross-site request forgery. DDoS attacks are also a huge risk of web-based applications, as well as session hijacking.

    Log in to Reply
  8. Brittany Pomish says

    November 17, 2024 at 7:39 pm

    Both desktop and web-based applications face several common/shared risks around unauthorized access, code vulnerabilities, data breaches, and malware.

    Unique risks for desktop applications include physical security, local system exploits, such as DLL hijacking and unauthorized file access, compatibility issues, and outdated updates, due to the manual nature of users running updates.

    Unique risks for web-based applications include network-based attacks, such as Distributed Denial of Service (DDoS) attacks, man-in-the-middle attacks, and server-side request forgery (SSRF), server vulnerabilities, data transmission risks, and scalability.

    Log in to Reply
    • Cyrena Haynes says

      November 19, 2024 at 8:20 pm

      One point to emphasize is that while both platforms deal with unauthorized access, the methods of exploitation differ. Web-based applications are more exposed to automated attacks due to their constant internet connectivity, whereas desktop applications face risks stemming from direct user interactions, like plugging in untrusted devices. Another consideration is the increasing prevalence of hybrid models that blur these boundaries, combining risks from both domains.

      Log in to Reply
  9. Tache Johnson says

    November 17, 2024 at 9:30 pm

    Desktop and web based apps share risks like malware, bad access controls, and unsecure scripts. However, desktop apps are especially vulnerable to local file exploitation and privilege escalation due to their integration with the operating system. Web based apps, relying on internet connectivity and client server models, face threats like man-in-the-middle attacks. Both require secure software coding practices and tailored security assessments to address these challenges effectively.

    Log in to Reply
    • Andrea Baum says

      November 20, 2024 at 4:02 pm

      You make a great point highlighting the distinct and shared risks between desktop and web based applications. Addressing these challenges requires not only secure coding practices but also a proactive approach to threat modeling and regular security assessments tailored to each application’s unique environment.

      Log in to Reply
  10. Dawn Foreman says

    November 17, 2024 at 9:42 pm

    Desktop applications and web based applications share the risk of vulnerability to malware and social engineering. Desktop applications are also susceptible to physical attacks such as theft and damage to local storage that can result in data loss or disruption in data availability. Additionally, desktop applications are vulnerable to corruption from failure that occur with the physical hardware of the computer. Web based appications are vunerable to online attacks such as DDoS and SQL injections. Additionally, these attacks can occure from anywhere in the worls and just require an internet connection.

    Log in to Reply
    • Neel Patel says

      November 18, 2024 at 10:19 am

      Hi Dawn! I really enjoyed your post! I completely agree with your points about desktop applications being at risk due to physical hardware failures and vulnerabilities to theft or damage. To expand on your thoughts about web-based applications, while they are indeed vulnerable to online threats like DDoS attacks and SQL injections, these risks are magnified by their global exposure—an attacker needs only an internet connection to exploit them. This highlights the importance of robust security measures for both types of applications to mitigate their unique vulnerabilities.

      Log in to Reply
  11. Gbolahan Afolabi says

    November 17, 2024 at 10:38 pm

    Applications regardless of how they run are generally susceptible to the same types of risks. Desktop applications and web-based applications are both susceptible to phishing and other types of attacks that target user credentials. If a user falls victim to a phishing email, they may accidentally reveal their credentials that can be used to login to a web-based application such as a bank account or dating app. Similarly, a user may accidentally download malware received over the internet or via email which can affect other desktop based applications.

    The difference between these two models would be the scale of attacks and risk. The risk involved in Desktops applications may be limited to the device or the application depending on the complexity of the attack. While the risks involved in web-based application tend to offer a large number of accounts and users. Although attacks on Software as a Service (SaaS) companies have been sensationalized, most attacks are limited to desktop-based applications. Even when they involve web-based applications, they are targeted at individual users or accounts.

    Log in to Reply
    • Aisha Ings says

      November 19, 2024 at 7:20 pm

      You made an excellent point about the similarities in vulnerabilities between desktop and web-based applications, especially with how easily users can fall victim to phishing or malware attacks. I agree that the main difference comes down to the scale and potential impact. Desktop threats might be more limited to a single device, but when a web-based application gets hit, it can affect a much larger group of users.

      Log in to Reply
  12. Neel Patel says

    November 17, 2024 at 11:25 pm

    Desktop and web-based applications share risks like unauthorized access, data breaches, malware infections, and social engineering. However, desktop applications often face unique risks such as local file corruption, OS-specific vulnerabilities (e.g., DLL injection on Windows), and limited network exposure compared to web-based systems. In contrast, web applications are more prone to cross-site scripting, SQL injection, and session hijacking due to their reliance on internet connectivity and interaction with multiple users and systems. For instance, a web app might be vulnerable to a cross-site scripting attack if user inputs aren’t sanitized. In contrast, a desktop app could risk relying on outdated libraries with known vulnerabilities.

    Log in to Reply
  13. David Lanter says

    November 18, 2024 at 7:50 am

    Note from Aisha Ings:
    I accidentally uploaded my answer to Question 1 under Question 2, and now I am unable to upload my correct answer for Question 1 because the system marks it as a duplicate comment.

    A common risk for both desktop and web-based applications is human error. This includes things like falling for phishing or social engineering attacks, misconfiguring settings, and using weak passwords. These errors can make both types of systems easy targets for attackers.
    Web apps, on the other hand, are accessible from any device, at any place and time, which makes them more exposed to security threats than desktop apps. Because of this, they need extra security measures, like controlling unauthorized internet access, handling users who may be hard to identify, and protecting against different cyber-attacks.
    Desktop apps often need to be manually installed and updated by users, and if updates are missed or ignored, the software can become vulnerable to threats.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in