0% Plagiarism Guaranteed & Custom Written

Apply the penetration testing security auditing concepts and identify the vulnerabilities by analyzing the web application components such as PHP and MySQL

Post Date: 30 - Nov - 2023

Title: Computer Science

Case Scenario:

We trust more and more of our personal information to websites. This makes things in our life very convenient but much more vulnerable because hacking attacks and security breaches make headlines every day. They range from serious, large scale attacks to simple ones and from simple ones to the ridiculous and life changing incidents. This assignment requires you to apply the penetration testing security auditing concepts and identify the vulnerabilities by analyzing the web application components such as PHP and MySQL. Assume that you are working as a penetration tester. You have been assigned a task to carry out a security testing of backend SQL database attached to a website containing possible security vulnerabilities. You will be using a vulnerable web application Mutillidae by OWASP as a test bed. You will setup the PHP based vulnerable application and conduct the security evaluation of its current state.

Based on the scenario by provisioning and utilizing appropriate web security standards/technology, propose a web security model to protect your organization. This is entirely based on assumption and no practical implementation is required. Please back up your answer with quality references


100% Plagiarism Free & Custom Written, Tailored to your instructions