• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

March 19, 2020 by Wade Mackey 26 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Zeynep Sahin says

    March 20, 2020 at 6:16 pm

    What are the risks associated with e-commerce services and which areas in e-commerce business processes should be reviewed by an IT Auditor?

    Log in to Reply
    • Percy Jacob Rwandarugali says

      March 24, 2020 at 8:51 am

      I think risks associated with E-commerce services include breach of customer PII and financial data.
      PCI DSS is the ideal framework for any ecommerce business today, they have 6 guidelines that are split into 12 objectives to help online businesses secure cardholder data and servers that process, transmit and store the data.

      Log in to Reply
  2. Innocent says

    March 21, 2020 at 5:16 pm

    with the explanations provided in this chapter which security principle is impacted by a buffer overfow attack ? . And if none, why ?.

    Log in to Reply
    • Zeynep Sahin says

      March 23, 2020 at 4:31 am

      Hi Innocent,

      Buffer overflow attack may damage integrity and confidentiality of security objectives. Attackers exploit buffer overflow vulnerability by overwriting the memory of a software which may damage files and expose sensitive information. In other words, attacker can change the execution path and transfer its control to attacker’s malicious code. After gaining control over the process, attacker can do anything, he/she can crash or change variables.

      Log in to Reply
  3. Percy Jacob Rwandarugali says

    March 22, 2020 at 2:16 pm

    What is the biggest risk facing web applications today?

    Log in to Reply
    • Numneung Koedkietpong says

      March 23, 2020 at 1:18 pm

      Personally, according to OWASP TOP 10, I think injection attacks are the biggest risk facing web application today. Hackers can find vulnerabilities from code and put injection to the script in order to gain unauthorized access to server and network.

      Log in to Reply
    • Sarah Puffen says

      March 24, 2020 at 11:51 am

      In general, it is suggested that injection is the top risk to web applications. However, I think that this answer may vary if you consider individual web applications and the assets that may be behind them.

      Log in to Reply
    • Christopher James Lukens says

      March 24, 2020 at 12:30 pm

      I think the the biggest risk posed to applications in general are developers who don’t care about security. This is why there are still flaws in many programs or simple attacks work because secure coding techniques were thrown out the window. Making sure the development team is invested in security is a great first step to ensuring secure coding practices are taking place.

      Log in to Reply
  4. Numneung Koedkietpong says

    March 22, 2020 at 2:19 pm

    Can you give the example of VoIP threats from real-world situation? How hackers used this technique? What was the impact?

    Log in to Reply
  5. Joseph Nguyen says

    March 22, 2020 at 6:27 pm

    What do you think about this owasp web code review checklist?
    https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf

    Log in to Reply
  6. Christopher James Lukens says

    March 22, 2020 at 7:55 pm

    what is the importance of testing servers during the applications life cycle?

    Log in to Reply
    • Numneung Koedkietpong says

      March 23, 2020 at 1:13 pm

      The importance of testing servers during the applications life cycle are as following purposes to ensure that;
      – Meets the business and technical requirements that guided its design and development
      – Works as per the requirement
      – Can be implemented with the same characteristics

      Log in to Reply
  7. Akshay Shendarkar says

    March 22, 2020 at 8:38 pm

    As an IT Auditor with only a fundamental knowledge of coding, what aspects can be looked at of a web application to assess its security posture?

    Log in to Reply
    • Zeynep Sahin says

      March 23, 2020 at 4:03 am

      Hi Akshay,
      IT Auditors can test following approaches:
      • Ensure that the web application is safeguarded against injection attacks,
      • Review session management and authentication methods,
      • Ensure that sensitive data is protected with using appropriate encryption technologies,
      • Verify proper access controls is in place,
      • Ensure controls over secure configuration of web servers,
      • Ensure that developers receive adequate secure coding training.

      Log in to Reply
      • Akshay Shendarkar says

        March 24, 2020 at 11:18 pm

        Hello Zeynep,

        Thank you for this list. I observe that this list is aligned for checking applications for the OWASP top 10 attacks and can certainly provide a good baseline for IT Auditors to assess the security of an application.

        Log in to Reply
    • Numneung Koedkietpong says

      March 23, 2020 at 1:09 pm

      Hi Akshay,
      Besides Zeynep’s response, IT auditors can review policy and procedure related to web application assessment. Policy and procedure is the significant fundamental which identify the scope and control safeguards.

      Log in to Reply
      • Akshay Shendarkar says

        March 24, 2020 at 11:19 pm

        Hello Num,

        You have correctly mentioned, polices and procedures are always a good starting point for auditors to understand what are the procedures used in making the web application functional and whether requisite security components are included.

        Log in to Reply
  8. Imran Jordan Kharabsheh says

    March 22, 2020 at 10:10 pm

    Of the OWASP’s Top Ten, which of the threats shown did you have the hardest time developing an understanding of?

    Log in to Reply
    • Junjie Han says

      April 1, 2020 at 12:13 pm

      I think the most difficult to understand is XML External Entities (XEE).

      Log in to Reply
  9. Sarah Puffen says

    March 22, 2020 at 11:35 pm

    What are some ways to secure VoIP?

    Log in to Reply
    • Zeynep Sahin says

      March 23, 2020 at 4:42 am

      Hi Sarah,

      In regard to protect confidentiality of VoIP, encryption can be used against eavesdropping. To protect integrity, in other words, providing unaltered information by unauthorized people, strong authentication schemes can be used, and caller ID should be verified, never be trusted. To protect availability, VoIP network should be protected against DoS attacks. To do so, firewalls should be in place to filter abnormal signals, and strong authentication methods should be applied to make sure legitimate parts are communicating.

      Log in to Reply
  10. Alexander Reichart-Anderson says

    March 23, 2020 at 12:21 am

    What do we think is the most important step to securing a asset? Is it on the surface or with encrypting the asset itself?

    Log in to Reply
    • Christopher James Lukens says

      March 24, 2020 at 12:25 pm

      I thin kine of the most important steps in securing an asset is properly assessing the risk level of the asset. If you assign something a moderate risk level when it should have been high then your going to under protect the asset. Making sure you understand what the asset is and the selecting the proper controls is the difficult part.

      Log in to Reply
  11. Junjie Han says

    March 23, 2020 at 10:48 pm

    The Attack Surface Analysis is important and complex. As an IT auditor, what type of software is needed for this Analysis? (suppose the importance is prioritized due to cost control)

    Log in to Reply
    • Peiran Liu says

      March 25, 2020 at 11:24 am

      Microsoft provides attacker surface analyzer from their website. Here is a description for the software.

      Attack Surface Analyzer is developed by the Microsoft Customer Security and Trust group. It is the same tool used by Microsoft’s internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This version represents a rewrite of the classic tool 1.0 version of the tools released in 2012 which was dedicated to older versions of Windows.

      Log in to Reply
  12. Peiran Liu says

    March 25, 2020 at 11:22 am

    How can we do attack surface analysis without reaching the code? Do we need a programer to understand how their application or website work?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in