Question 1 (20 marks)
Use the Internet to research defenses against injection attacks.
- a) What are the defenses to protect against SQL injection attacks, XML injection attacks, and XSS?
- b) How difficult are they to implement?
- c) Why are these defenses not used extensively? Write a two-page research to answer these questions1.
Question 2 (20 marks)
Data loss prevention (DLP) is a system for monitoring how critical data is accessed. a) Use the Internet to identify three DLP products.
- b) Make a list of their features, architecture, strengths, weaknesses, and so on.
- c) Then determine if each of these products could be used by an attacker to identify vulnerabilities in an organization’s data protection.
Create a table comparing the products and write an analysis of your research2.
Question 3 (20 marks)
Hypertext Transport Protocol over Secure Sockets Layer (HTTPS) is becoming increasingly more popular as a security protocol for Web traffic. Some sites automatically use HTTPS for all transactions (like Google Gmail), while others require that the user must configure it in their settings (such as Facebook).
- a) What are the advantages of HTTPS?
- b) What are its disadvantages?
- c) How is it different from HTTP?
- d) How must the server be set up for HTTPS transactions?
- e) How would it protect you using a public Wi-Fi connection at a local coffee shop?
- f) Should all Web traffic be required to use HTTPS? Why or why not? Fully argument your answers3.
Question 4 (20 marks)
As cloud computing increases in popularity, enhanced features are being added. Amazon Web Services (AWS) now supports a Virtual Private Cloud infrastructure through which organizations can create a network topology in the AWS cloud that closely resembles their own physical data center, including public, private, and demilitarized zones (DMZs).
- a) Research AWS’s Virtual Private Cloud or another cloud vendor’s similar offering. What are your impressions?
- b) Would this be something that an organization should consider?
- c) What are its technical limitations? Write a two-page summary of your research4.
Question 5 (20 marks)
- a) Interview a network administrator or an IT professional. Ask questions to find out how is cyber security approached in his/her line of work.
- b) Write a summary of the interview (provide the transcript as an appendix).
- c) Using critical thinking and considering the knowledge gained from this subject, what have you learned about e-security from this professional?