• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?

Filed Under: 5b: Computer Application Security Tagged With:

Reader Interactions

Comments

  1. Yingyu Wang says

    June 17, 2025 at 8:12 am

    The common risks between desktop applications and web applications include insufficient input validation, which can be exploited by malicious actors to corrupt the internal structure or execute illegal commands; failure to follow the principle of least privilege, which may lead to privilege escalation attacks; and the existence of critical logs in both types of applications, where the default open logging configuration could lead to tampering risks.
    As for the unique risks of each type of application, desktop applications may suffer from insufficient local storage, encryption flaws, and a lack of binary protection. On the other hand, web applications face risks such as XML parsing vulnerabilities, which could lead to XML injection attacks, and reliance on cookies or URL parameters for session management, which could create session management vulnerabilities.

    Log in to Reply
  2. Xinran Wu says

    June 17, 2025 at 9:19 am

    Both of them can lead to SQL injection, buffer overflow, access control flaws, dependency chain risks, etc. due to coding errors.
    The unique risks of desktop applications include users running the application with administrator privileges, malicious software controlling the system, direct leakage of local stored data due to device loss or theft, and users failing to install patches in a timely manner.
    The unique risks of web applications include attackers injecting malicious scripts to steal session cookies, tricking users into triggering unintended actions, forging server requests, exploiting server access to internal network resources, DDoS attacks, and XML injection attacks.

    Log in to Reply
  3. Jingni Li says

    June 18, 2025 at 1:52 am

    Common/Shared Risks:
    1. Being targeted by malicious software: such as accidentally downloading files with viruses, or clicking on phishing links, resulting in computer poisoning and data theft.
    2. User slip errors: such as accidentally deleting important files, entering the wrong password to allow bad people to break into the account, or casually sending sensitive information to others.
    3. Hidden risks of data leakage: Whether stored on the computer or in the cloud, if security is not properly implemented, hackers may steal user information and sell it for money.

    Different/Unique Risks:
    Desktop applications (software installed on the computer):
    1. If there is a problem with the computer, go blind: for example, if the computer crashes or the hard drive is broken, the data in the software may be lost directly, and you have to manually backup it yourself.
    2. Forgetting to update can be dangerous: If software patches are not installed in time, hackers may take advantage of vulnerabilities in older versions.
    3. Compatibility Troubles: After the new system is released, old desktop software may not be compatible and suddenly cannot be used.
    Web applications (software opened through a browser):
    1. Without a network, it will crash: If the network is disconnected or too slow, web applications cannot be opened and nothing can be done.
    2. Scammed by phishing websites: Bad people may simulate web pages and create fake ones, deceiving users into entering their account passwords.
    3. Web vulnerability attacks: For example, malicious code infiltrates the browser through web pages, secretly tampering with page content or stealing information (like someone has planted traps in the web pages you are browsing).

    Log in to Reply
  4. Ruizhen Zhang says

    June 18, 2025 at 5:30 am

    Desktop applications and web-based applications share some common security risks, such as input validation flaws, buffer overflow vulnerabilities, and SQL injection vulnerabilities.
    However, desktop applications are more prone to risks related to the local file system, local system, memory management, and physical access, while web applications face unique risks such as cross-site scripting (XSS), cross-site request forgery (CSRF), session management vulnerabilities, and browser vulnerabilities.

    Log in to Reply
  5. Siyu Li says

    June 18, 2025 at 8:17 am

    Desktop applications and web-based applications exhibit both common and unique risk profiles due to their architectural and deployment differences. Both types face shared risks such as data breaches, malware infections, performance bottlenecks, user error, and data loss/corruption. For instance, unauthorized data access and resource overconsumption can impact both, while injection attacks pose threats if they involve backend logic.

    Unique risks for desktop apps center on local system integration (e.g., OS corruption, privilege escalation), malicious installers, hardware compatibility issues, and physical theft of locally stored data. Web applications, however, are more susceptible to network dependencies (server outages, DDoS attacks), client-side vulnerabilities, browser security flaws, and cloud service compliance risks.

    Log in to Reply
  6. Yufei Zhu says

    June 18, 2025 at 10:29 am

    Both desktop applications and web applications can be exposed to risks such as malicious input from attackers, authentication difficulties, and data leakage. An attacker can utilize a vulnerability in the code and enter some specific data for the purpose of interrupting the system or stealing information. It is also possible to hijack a legitimate user’s session, and sensitive data may be leaked as a result. However, desktop applications may also lead to local data leakage due to unencrypted sensitive data. Web applications may have insecure sessions or transmission lines, such as unencrypted transmission data, which can lead to information leakage.

    Log in to Reply
  7. Jialin Fan says

    June 18, 2025 at 11:01 am

    Common risks for both desktop and web-based applications include security vulnerabilities such as malware attacks, data breaches, and software bugs. They are also both subject to compatibility issues with different operating systems and hardware.
    The unique risks for desktop applications are mainly related to installation and maintenance. For example, they may require more disk space and system resources, and it can be difficult to update them across multiple devices. There is also a risk of software piracy.
    On the other hand, web-based applications face risks such as dependence on network connectivity. If the network is unstable or down, users cannot access the application. They are also more exposed to DDoS attacks and cross-site scripting attacks.

    Log in to Reply
  8. Zuqi Zhang says

    June 19, 2025 at 5:18 am

    desktop applications and web-based applications have some common risks. For example, they both need to deal with security issues. Hackers can try to break into either type of app to steal data or cause trouble. Also, they both have to worry about performance. If an app slow is or crashes, users are going to be unhappy.
    But there are also some unique risks for each type. For desktop applications, one big risk is compatibility. You know, different computers have different operating systems and hardware, so a desktop app might work perfectly on one machine but have problems on another. Another issue is that updates can be tricky. Users might forget to update the app, and then they miss out on important new features or security patches.
    On the other hand, web-based applications have their own unique challenges. One is that they rely heavily on the internet. If there’s a network problem, the app might not work at all. Also, web apps are more exposed because they’re accessible from anywhere. That means they have a bigger attack surface for. hackers And since they’re hosted on servers, there’s always the risk of server downtime or issues with the hosting provider.

    Log in to Reply
  9. Wenhao Liu says

    June 19, 2025 at 5:50 am

    Common/Shared Risks:
    1. Buffer Overflows: Both can suffer from memory handling flaws where input data exceeds allocated buffer sizes, allowing attackers to execute arbitrary code.
    2. Injection Attacks: SQL injection, command injection, or script injection can occur if input validation is weak, enabling attackers to manipulate data or execute unauthorized commands.
    3. Authentication and Authorization Flaws: Weak password policies, improper session management, or flawed access controls can lead to unauthorized access.
    4. Data Exposure: Sensitive data like passwords or personal information might be stored or transmitted insecurely, risking leaks.
    Different/Unique Risks:
    Desktop Applications:
    1. Local Exploitation: Vulnerabilities can be exploited via local files or system resources.
    2. Update Management: Outdated software versions may lack patches, leaving known vulnerabilities unaddressed.
    3. Platform Dependency: Risks vary by OS (e.g., Windows vs. macOS), and desktop apps may rely on system APIs with inherent risks.

    • Web-Based Applications:
    1. Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages, exploiting user interactions.
    2. Cross-Site Request Forgery (CSRF): Forced actions on behalf of users via forged requests.
    3. Server-Side Vulnerabilities: Web servers may face risks like directory traversal or improper file handling.
    4. Network Exposure: Constant internet connectivity makes web apps more susceptible to remote attacks.

    Log in to Reply
  10. Changyang Sui says

    June 19, 2025 at 8:12 am

    Common/Shared Risks for Desktop and Web-Based Applications:
    1. Buffer Overflows: Both types of applications can suffer from buffer overflow vulnerabilities if input data exceeds allocated memory space, potentially leading to arbitrary code execution.
    2. Improper Authentication/Authorization: Weak password policies, hardcoded credentials, or flawed session management can compromise both types.
    3. Race Conditions: Concurrent access to shared resources (e.g., files) can lead to exploits in both environments.
    Key Differences:
    1. Attack Surface: Web apps face network-based attacks (e.g., XSS, CSRF), while desktop apps face local exploits (e.g., privilege escalation).
    2. Deployment Environment: Web apps rely on server/browser security, whereas desktop apps depend on the host OS and user permissions.
    3. Update Mechanism: Web apps can push updates centrally, while desktop apps often require user intervention, leaving unpatched systems vulnerable longer.

    Log in to Reply
  11. Meiyan Liu says

    June 19, 2025 at 8:24 am

    Desktop and web applications share common risks such as buffer overflows, SQL injection, inadequate input validation, access control flaws, and code execution vulnerabilities. Web applications face unique risks including XSS, CSRF, session hijacking, web service/API vulnerabilities, and HTTP/protocol-related risks. Desktop applications have specific risks involving local resource access, update management challenges, language-specific vulnerabilities, native system integration risks, and offline exploitation vectors.

    Log in to Reply
  12. Jianwei Huang says

    June 19, 2025 at 10:10 am

    Both desktop and web-based apps face shared risks like malware attacks (viruses, trojans) that can steal data or damage systems. They also share vulnerabilities in user authentication—weak passwords or poor verification can let hackers in. Data breaches are another common threat; if encryption fails, sensitive info like user details can leak.
    Their unique risks differ by environment. Desktop apps risk issues from local installations—downloading corrupted files from untrusted sources can install malware. Outdated desktop versions are risky too, since users might skip manual updates, leaving old vulnerabilities. Web apps, though, face web-specific attacks: hackers can inject malicious code into websites (like script attacks) or trick users into harmful actions (cross-site tricks). They also rely on networks, making them targets for man-in-the-middle attacks, while desktop apps (if offline) are safer from such online intercepts.

    Log in to Reply
  13. Yiying Chen says

    June 19, 2025 at 12:27 pm

    Shared Risks:
    1.Can be attacked by malicious inputs. The classic one is the SQL injection can be utilized by hackers to steal data in these apllications.
    2.They may have permission problems. As a normal user, I can access admin functions in both applicaitons in any permission ways.
    3.Their risk data leaks if information is not encrypted, with passwords stored in plain text or other easy-obtained way.
    4.Both use third-party components that may have security holes like old software libraries with known vulnerabilities.
    Separate risks:
    1.Their attacked mechanisms are different. Hackers can exploit system bugs to take control in desktop applications while hackers inject malicious scripts into websites applications.
    2.Attackers reverse-engineer the software to steal secrets without desktop applications users positive operations, as attackers trick web-based applications users into submitting bad requests.
    3.Fake updates may install malware in desktop applications while unprotected APIs can be abused by hackers to attack web-based applications.

    Log in to Reply
  14. Shouxi Mou says

    June 20, 2025 at 1:07 am

    1. Shared Risks (Both Face)​​
    ​​Malware Infections​​: Viruses, ransomware, etc.
    ​​Data Breaches​​: Unauthorized access to sensitive info.
    ​​Insider Threats​​: Employees misusing access.
    ​​2. Unique Risks – Desktop Apps​​
    ​​Local Exploits​​: Vulnerabilities in installed software.
    ​​Physical Theft​​: Lost/stolen devices = data exposure.
    ​​Update Delays​​: Users skip patches, leaving holes.
    ​​3. Unique Risks – Web Apps​​
    ​​DDoS Attacks​​: Overload servers, disrupt service.
    ​​Cross-Site Scripting (XSS)​​: Hackers inject malicious code.
    ​​API Vulnerabilities​​: Broken integrations leak data.

    Log in to Reply
  15. Jiwei Yang says

    June 20, 2025 at 1:25 am

    Desktop applications and web applications share common risks such as malware, data leakage, and supply chain vulnerabilities. However, their risk characteristics differ: Desktop applications, due to their direct integration with the operating system, are prone to local privilege escalation and USB device attacks, and manual updates may be lagging, resulting in vulnerabilities not being patched; Web applications, on the other hand, face server-side attacks, network layer risks, and browser compatibility vulnerabilities. Understanding these differences is crucial for security strategies: Desktop applications need to strengthen local protection and automatic update mechanisms, while web applications should focus on server-side input validation and network transmission encryption.

    Log in to Reply
  16. Yan Liu says

    June 20, 2025 at 2:35 am

    Desktop and web applications face shared risks: malicious input, authentication flaws, and data leakage. Attackers exploit code vulnerabilities with crafted inputs to disrupt systems or steal info, or hijack user sessions. Desktop apps risk local data leaks from unencrypted sensitive data, while web apps suffer from insecure sessions/transmissions (e.g., unencrypted data), both compromising confidentiality and integrity.

    Log in to Reply
  17. Xintong Zhang says

    June 20, 2025 at 3:14 am

    The common risks faced by desktop applications and web applications include: buffer overflow, SQL injection, authentication and authorization vulnerabilities, lack of input and output validation, and improper file permission management. The different risks between the two lie in: web applications have the unique cross-site scripting and script injection attacks, where attackers use malicious scripts embedded in user input to hijack sessions or steal data; there is a risk of data leakage due to unencrypted communication of HTTP/HTTPS protocols, as well as cross-site request forgery and XML injection in web services; desktop applications are more likely to face risks such as unauthorized access to local file systems, improper invocation of system-level permissions during integration with the operating system, and the malicious exploitation of client software vulnerabilities.

    Log in to Reply
  18. Wenhao GUO says

    June 20, 2025 at 3:47 am

    Both desktop and web applications share common risks like facing attacks from malicious inputs (such as hackers using harmful data to disrupt systems or steal info, similar to SQL injection where bad code is inserted to access data), struggling with authentication issues (where it’s hard to secure login processes), and risking data leakage if information isn’t encrypted properly (like passwords stored in plain text). They also both rely on third-party components that might have security flaws, such as old software libraries with known vulnerabilities. However, they have unique risks too. Desktop apps can cause local data leaks if sensitive data on the user’s device isn’t encrypted, and they might fall victim to fake updates that install malware. On the other hand, web apps often face risks from insecure sessions or unencrypted data transmission over the internet, making info easier to intercept. Also, attackers might inject malicious scripts into web apps or abuse unprotected APIs, while desktop apps could be reverse-engineered to steal secrets without users realizing, unlike web apps where users might be tricked into submitting bad requests.

    Log in to Reply
  19. Yiwen Lou says

    June 20, 2025 at 5:33 am

    Desktop and web-based applications have risk profiles that overlap in some areas but differ fundamentally due to their architectural and deployment models. Both face common threats like data breaches, malware infections, performance lags, user-induced errors, and data loss or corruption. For example, unauthorized access to sensitive data and excessive resource usage can affect either type, while injection attacks pose risks if they target shared backend logic.
    Desktop applications carry unique risks tied to local system integration—think OS corruption, privilege escalation vulnerabilities, or malicious installers. Hardware compatibility issues and the physical theft of locally stored data are also major concerns. Web applications, conversely, are more exposed to network-dependent risks such as server outages, DDoS attacks, client-side flaws, browser security gaps, and compliance challenges in cloud service environments. These distinctions highlight how deployment models shape security vulnerabilities: desktop apps face more local-system threats, while web apps grapple with network and cloud-specific risks.

    Log in to Reply
  20. Huiling Huang says

    June 20, 2025 at 6:22 am

    Common risks for both desktop and web applications include security vulnerabilities (such as code flaws leading to injection attacks or data breaches), malicious attacks (susceptibility to viruses, malware, or phishing threats compromising system security), compatibility issues (operational anomalies from adapting to different device environments or system versions), and authentication risks (flaws in identity verification mechanisms exploitable by unauthorized users).

    For unique risks, desktop applications rely heavily on local operating systems or hardware, requiring individual installations for upgrades which incurs high maintenance costs. Offline data stored locally poses leakage risks if devices are lost or stolen, and installation packages may be tampered with to implant malicious code. Web applications, conversely, are entirely dependent on network connectivity—interruptions render them inoperable, and they are vulnerable to network attacks like DDoS. With all data and logic centralized on servers, a breach affects a broader scope. Additionally, cross-browser and multi-device compatibility testing is complex, potentially causing display or functional anomalies.

    Log in to Reply
  21. Xiaojin Liu says

    June 20, 2025 at 7:45 am

    The common security risks faced by desktop and web applications include insufficient input validation, permission management flaws, data leakage, and vulnerabilities in third-party components. These issues usually stem from code defects or the absence of security measures and require resolution through strict development norms and continuous monitoring. The unique risks for each type are related to their operating environments: desktop applications are more susceptible to local storage security, privilege escalation, and physical access; while web applications are more vulnerable to network attacks such as XSS, CSRF, and session hijacking. For different application types, targeted protective measures need to be taken to build a multi-layered security defense system.

    Log in to Reply
  22. Jiaxuan Ma says

    June 20, 2025 at 8:17 am

    Common risks:
    1. Access Control flaws
    2. Buffer Overflows
    3. SQL Injection
    4. Format strings vulnerability
    5. Command Injection/Shell escape
    6. Race Conditions

    Unique risks:
    Desktop applications:
    1. Attackers may exploit vulnerabilities in the application to access local files, or access sensitive local system information through the application.
    2. If installation program installed on the device itself is not secure during the installation process, malicious software may be installed on the user’s device.
    Web-based applications:
    1. The server side of Web applications needs to handle a large number of user requests and data, and is prone to becoming a target of attacks. Improper server configuration, software vulnerabilities may cause attackers obtaining control of the server.
    2. The client side of Web applications may have security vulnerabilities. Attackers can exploit these vulnerabilities to attack user devices, for example, by infecting user devices through malicious scripts or malware.

    Log in to Reply
  23. Liyuan Zhou says

    June 21, 2025 at 3:41 am

    Both desktop and web applications are susceptible to data breaches (such as stolen account information), malicious code attacks (like viruses or harmful scripts), and chaotic user permission control that enables unauthorized operations.

    Desktop applications carry greater local risks: their installation packages can be tampered with to embed viruses, software vulnerabilities may allow hackers to seize control of users’ computers, and compatibility requirements across different operating systems can introduce security flaws.

    Web applications, meanwhile, face server-side threats: they are vulnerable to attacks like SQL injection, depend on browsers that might have XSS (cross-site scripting) flaws, and unencrypted data transmission (without HTTPS) makes information prone to interception during transit.

    Log in to Reply
  24. Rong Su says

    June 21, 2025 at 8:19 am

    Desktop applications are more vulnerable to local environment threats, such as unauthorized access to the local file system, tampering of installation packages, log leakage in offline states, and long-term existence of version vulnerabilities due to delayed updates. Web applications, however, face unique network-layer risks, including cross-site request forgery, exposure of API interfaces, vulnerabilities in shared infrastructure dependent on cloud services, and security configuration failures caused by browser compatibility differences. Meanwhile, their dynamic interaction characteristics make OWASP Top 10-class risks more prominent.

    Log in to Reply
  25. Meiqi Yan says

    June 21, 2025 at 8:30 am

    The common risks of both are: they may both be subject to attacks due to insufficient filtering of user input. Component dependency risk Identity authentication flaws, data storage risks.
    2. Risks specific to desktop applications: Exposure of local environment, lag in upgrades, abuse of system permissions.
    Web application risks: Centralized threat on the server side, API security weaknesses, risks in the hosting environment.
    In summary, the risks of desktop applications mainly lie in the control of terminal devices and reverse engineering, while the risks of web applications focus on server protection and transmission security.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 1:01 pm

    Both desktop and web applications face critical security challenges that can compromise system integrity and data confidentiality. Malicious actors may exploit coding vulnerabilities to inject harmful inputs designed to disrupt operations or exfiltrate sensitive information, while authentication weaknesses can enable session hijacking attacks. Platform-specific risks emerge in their distinct environments – desktop applications often suffer from local data exposure through unencrypted storage of sensitive information, whereas web applications frequently exhibit vulnerabilities in session management and data transmission, particularly when communications occur over unsecured channels. These differing attack vectors demonstrate how each platform inherits unique security considerations despite sharing common threats like unauthorized access and data leakage, requiring developers to implement tailored protective measures that address both universal application risks and platform-specific exposures.

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 1:26 pm

    Common Risks (Shared)​​
    ​​Input Validation Flaws​​
    ​​Threats​​: SQLi, buffer overflows (desktop), XSS (web)
    ​​Cases​​:
    Adobe Flash remote code execution (CVE-2018-15982)
    eBay XSS stealing sessions (2014)
    ​​Dependency Vulnerabilities​​
    ​​Issue​​: Outdated libraries (e.g., Log4j affects both)
    ​​Data​​: 73% apps have vulnerable dependencies (Synopsys 2023)
    ​​Misconfigurations​​
    ​​Examples​​: Hard-coded secrets, debug mode enabled
    ​​Impact​​: >500,000 apps leaked API keys on GitHub (2022)
    ​​Permission Failures​​
    ​​Shared Risk​​: Over-privileged access (e.g., user accessing admin functions)
    ​​Desktop-Specific Risks​​
    ​​Uncontrolled Local Environment​​
    ​​Threats​​: Keyloggers, memory scrapers (e.g., Emotet malware)
    ​​Reverse Engineering​​
    ​​Risk​​: Cracking license mechanisms via tools like IDA Pro
    ​​Protection Cost​​: >$20,000/year for code obfuscation (e.g., VMProtect)
    ​​Patch Management Gaps​​
    ​​Issue​​: Only 30% users update within 7 days
    ​​Consequence​​: WannaCry exploiting unpatched SMB protocol
    ​​Web-Specific Risks​​
    ​​Client-Side Script Attacks​​
    ​​Threats​​: CSRF, DOM hijacking (e.g., Twitter 2018 CSRF breach)
    ​​Server-Side Supply Chain Risks​​
    ​​Issue​​: Tainted CDNs, third-party API leaks
    ​​Data​​: 300% rise in web app supply chain attacks (Sonatype 2023)
    ​​Session Management Failures​​
    ​​Risk​​: Session fixation, token theft
    ​​Defense​​: Strict HTTPS + SameSite Cookies
    ​​Risk Comparison Matrix​​
    ​​Risk Type​​ ​​Desktop App​​ ​​Web App​​ ​​Shared​​
    ​​Environment Control​​ ❌ Uncontrolled user devices ✅ Server-controlled –
    ​​Reverse Engineering​​ ⚠️ High risk 🔰 Low risk –
    ​​Session Hijacking​​ 🔰 Low risk ⚠️ High risk –
    ​​Dependency Flaws​​ ✅ ✅ ✅
    ​​Input Validation​​ ✅ ✅ ✅

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 7:49 pm

    Here’s a breakdown of shared risks and unique risks for desktop vs. web applications, based on architecture, deployment, and attack surfaces:

    Shared Risks (Common to Both):
    1.Insecure Code/Design Flaws
    2.Authentication/Authorization Failures
    3.Data Exposure
    4.Injection Attacks

    Unique Risks to Desktop Applications:
    1.Local System Access
    2.Physical Security
    3.Patch Management
    4.Legacy System Support

    Unique Risks to Web Applications:
    1.OWASP Top 10 Threats
    2.Server-Side Vulnerabilities
    3.Session Hijacking
    4.DDoS Attacks

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in