Discuss one specific scenario to articulate the insecurity of web applications when no protection is implemented by the solution provider.
Discuss one specific scenario to articulate the insecurity of web applications when no protection is implemented by the solution provider.
May 28, 2020 Comments Off on Discuss one specific scenario to articulate the insecurity of web applications when no protection is implemented by the solution provider. Uncategorized Assignment-helpEach discussion needs to be one page Reach me out if anything 2 sources each discussionDISCUSSION 1L2: Discussion 1 – Intercepted Data1010 unread replies.1010 replies.PurposeIn this discussion, I would like you to explain how insecure a web application could be if proper protection is not implemented by the solution provider (the one hosting the web application).TasksPlease submit one original post using the following guideline:Provide an example of how your inputs via a web form could be intercepted by attackers/intruders.Discuss one specific scenario to articulate the insecurity of web applications when no protection is implemented by the solution provider.Present a possible solution to address the insecure scenario.Grading (Total of 3 points)Did you use an example to illustrate your point of view? (1.5 points)Quality of your contributions (1.5 points)DETAILED RUBRIC FOR DISCUSSION 1L2: Discussion 1L2: Discussion 1CriteriaRatingsPtsThis criterion is linked to a Learning OutcomeAn example with a description of the 1) target web application, 2) intercepted data, 3) consequence, 4) and a solution to address the uncovered scenario.1.5 ptsWell done1.0 ptsMeets main criteria0.5 ptsNot clearly explained0.0 ptsNo Marks1.5 ptsThis criterion is linked to a Learning OutcomeQuality of post: 1) example with screenshots, 2) explanation, and 3) interest, challenge, and/or technical strength.1.5 ptsWell done1.0 ptsMeets main criteria0.5 ptsMarginally meets criteria0.0 ptsNo Marks1.5 ptsDISCUSSION 2L2: Discussion 2 – Penetration Testing99 unread replies.99 replies.PurposeIn this discussion, I would like you to get a better understanding of white box and black box testing.TasksPlease submit an original post focusing on the following questions and guidelines.Describe an example where you must use the Black Box approach to complete your penetration testing.Discuss why you would like to conduct White Box testing to supplement your penetration testing on your in-house web applications.Grading Rubric (Total of 3 points)Did you use an example to illustrate your point of view? (1.5 points)Quality of your contributions (1.5 points)DETAILED RUBRICCriteriaRatingsPtsThis criterion is linked to a Learning OutcomeAn example with a description of the 1) target web application, 2) a corresponding Black Box testing scenario, 3) a White box testing case.1.5 ptsWell done1.0 ptsMeets main criteria0.5 ptsNot clearly explained0.0 ptsNo Marks1.5 ptsThis criterion is linked to a Learning OutcomeQuality of post: 1) explanation and comparison, 2) interest, challenge, and/or technical strength.1.5 ptsWell done1.0 ptsMeets main criteria0.5 ptsMarginally meets criteria0.0 ptsNo Marks1.5 pts