Wednesday, February 26, 2020

Web Server Application Attacks Assignment Example | Topics and Well Written Essays - 750 words

Web Server Application Attacks - Assignment Example This keeps the web application safe from malicious user inputs. Session Security Vulnerabilities. When session ID’s are sequential and persistent or when session tokens are not protected, one user may access another user’s data through assuming the other user’s identity. To mitigate this, session ID’s must be random and must expire when a user logs out of the session. Session tokens must be protected and invalidated when the user logs out. 3. Authentication Vulnerabilities When server does not authenticate a user before giving him access to a web application, he may gain access to sensitive information and mishandle it. To counter this problem, the user must apply authentication rules like HTTPS. User must ask for authentication after specified intervals. Access control must also be implemented. Part 2 Protecting Web Servers from Denial of Service (DoS) Attacks Denial of Service (DoS) attacks prevent web servers from serving websites to genuine users. These attacks are, mostly, targeted toward professional websites run by political or other important organizations, in order to hinder their web presence to their clients and users (AppliCure Technologies, 2013). However, small businesses are also not free of such threats. The websites cease to operate partially or fully. A DoS intrusion detection architectural design is a must-use in order to prevent such attacks. Mell, Marks & McLarnon (2000) have discussed this architecture in their article, in which intrusion detection software (IDS) components are hidden from the attacker. In case the attack is successful, IDS components are shifted from the attacked host to functional host, where they counter with the attack successfully. This is done by by using mobile agent technology and network topology features. The communication bet ween various IDS components is also restricted (Mell, Marks & McLarnon, 2000). Part 3 a. Basic motivation behind the attack on the Justice Department, as hackers themselves stated, was that they wanted to â€Å"release government data† (Zabarenko, 2013, para.1). They were also outraged over the death of the late computer prodigy Aaron Swartz, who had committed suicide on January 11 this year. He had been facing trial for stealing millions of online JSTOR articles. b. I would have used Ping of Death, as it is a dummy ICMP packet receiving fragments of ping, and resembles the real packet. It becomes too big for the buffer once reassembled, which starts overflowing, and thus, the system hangs (Canavan, 2001, p.39). I would use this because there are freely available source code examples on the internet for Unix to create large ping packets. It is very easy to ditch the user through fake ping packet. c. Web server application attacks are not as easy as they may seem, because ther e are many different kinds of anti-virus softwares, intrusion detection softwares, and user input detection and encoding softwares that are being implemented nowadays. These special softwares make it very hard for the attackers to succeed in their attacks. Part 4 To maintain a secure web presence, Federal government organizations need to maintain special mitigation strategies. Designing an information security policy is the first step towards the implementation of information security (Danchev 3). A security policy acts as a centralized crucial document that will help in eliminating the risk of security breaches by securing the confidential information stores from getting disclosed to unauthorized persons. It defines the importance of a

Monday, February 10, 2020

Diabetes management Essay Example | Topics and Well Written Essays - 3500 words

Diabetes management - Essay Example lood glucose monitoring, oral and insulin therapies, Furthermore, the essay examines the role of multidisciplinary teams in offering patient-centered diabetic care and patients with such conditions. Lastly, the paper has critically detailed the physical, psycho-social and cultural impact of diabetes on clients and their families. The essay incorporates a case study of type 2 diabetic patient with pressure ulcers in his diabetic feet and associated conditions such as unitary and bowel incontinence, but has not adequate knowledge of management and care of his diabetic feet. The essay has adhered with ethical conduct of Nurses and Midwifes since the identity of the patient has been altered to John in order to protect confidential medical information of the client. The case study has been included in the appendix. Anderson and Rubin (2000) agree with Edmonds (2013) that diabetes results from several biological, environmental and lifestyle factors that lead to abnormal metabolism and hyperglycemia. Foster and Edmonds (2013) conquers with Cheyette (2005) that diabetes is a life-long condition that is associated with high glucose in the blood since the pancreas is incapable of producing enough insulin that is essential in regulating the blood sugar levels. I agree with Cheyette (2005) that John is experiencing high sugar levels due to inability to produce enough insulin. As Anderson and Rubin (2000) have outlined, insulin initiates the signal transduction whereby the glucose will enter the bloodstream for it to be stored as energy in the muscles or converted to fat by the liver. Tuomi (2005) confirms that insulin signals the liver to convert glucose to glycogen in case the body has sufficient energy. From the analysis, I believe insufficient of insulin affects metabolism processes in the body of John. The Health Commission (2007) explains that some critical pathophysiological aspects of type 2 diabetes include impaired secretion of insulin and increased body resistance