preview

Cyber Security And Cloud Computing Essay

Better Essays

Cyber Security and Cloud Computing

ISCG – 8047

Cyber Security and Web Applications

ASSIGNMENT 1

Submitted To: Submitted By:
Prof. Bahman Sarrafpour Sojan Chandy Therakom: 1468736 Contents
Introduction 2
Why is it important 2
Cyber war 3
Major Threats 3
Viruses: 3
Worms: 3
Spyware/Adware: 3
Trojans: 3
Rootkit 3
Botnet 4
Hoaxes and Urban Legends: 4
Denial-of-service (DoS): 4
Various Security Standards 4
Spoofing identity: 4
Tampering with data. 4
Repudiation. 5
Information disclosure. 5
Denial of service. 5
Elevation of privilege. 5
(ISO/IEC 27001) 5
CPE: 5
CWE 5
CVE 5
CAPEC: 5
CCE: 5
Security Tools 6
Honeypots 6
Classification of honeypots 7
Honeypot Implementation 7
Honeyed 7
Service-specific honey pots 8
Web Application Firewall 8
ModSecurity for Web Applications 8
ModSecurity for IIS 9
Conclusion 11

Cyber Security and Web Applications
Introduction
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Cybersecurity is the form of technologies, procedures and

Get Access