Research and classify common weaknesses and attacks


As the organization moves into the e-commerce model, new risks will be introduced to the organization. As a information security analyst, your role is to summarize the business impact of new risks, along with factors that one may have to exploit vulnerabilities, and how the risks can be mitigated. Make a presentation to senior management to assist the team in understanding IT security risks associated with an e-commerce model. Additionally, the senior management team will need to use the report as guidance for determining a budget allocation for hiring new IT professionals. Through the given scenario of UNFO, identify the weaknesses and vulnerabilities associated with the proposed Web platform.

  1. Research and classify common weaknesses and attacks associated with e- commerce and social networking applications.
  2. Identify the motivation for potential attacks.
  3. Identify the roles such as system administrator, developer, security engineer, and quality assurance analyst for each classification.
  4. Explain the business impacts of a successful exploit on a Web application's weakness.
  5. Summarize the importance of identifying weaknesses and motivation for attacks early in the development or implementation process.

Solution Preview :

Prepared by a verified Expert
Business Management: Research and classify common weaknesses and attacks
Reference No:- TGS02450307

Now Priced at $25 (50% Discount)

Recommended (95%)

Rated (4.7/5)