The Final Part Of The Plan Development Essay
Software side threats (Harwood, n.d.).
Threat Description of threat Mitigating method
Injection Injection defects will empower the hacker to bypass application access controls and make, change, erase or read information the application can get to. Require proper input validation, and verify all data that is received. This prevent malicious data from being entered into a target application.
Broken authentication and session management Compromised validation procedures lead to information leakage Create strong passwords
Cross-site scripting (xss) Harmful scripts are applied to the web server however they keep running on the customer browser with XSS, attempts are made to execute this dangerous code by injection it running it on the customer browser. Train users in how to detect and identify suspicious links, which can restrict the access to high risk sites.
Security misconfiguration Applications or hardware might have improper settings and configurations which can lead to serious risks. Try to remove or control access to non-essential applications.