Verified Document

Software Applications: Vulnerabilities And Controls Essay

All of these tools make it possible for a hacker to not only corrupt the application itself in terms of accessing confidential information, but further allow for the hacker to spread damage deep into the application to attack other systems, essentially able to shut down an entire application with the corruption of contained information. Though some of the aforementioned tactics involve the physical infiltration of a company in order to gain information and access into applications, the more common hacking tactics are the use of technological tools that allow the hacker to access information from the comfort of their own computer. The SANS (SysAdmin, Audit, Network, Security) Institute notes that there currently "appear to be two main avenues for exploiting and compromising applications: brute force password guessing attacks and web application attacks" (Dhamankar, Eisenbarth & King, 2009). This type of attack seems to be trending at an unparalleled level as seen in the figure to the right featured in the aforementioned SANS report detailing reported application threats in 2009.

Controls and Protections

In viewing the risks that hacking poses and in viewing some of the tools that hackers use, it is clear that software vulnerability control is likely one of the most important parts of application security. Though application control is a relatively new development in information security, several software manufacturers have come out with products that have proven effective in fighting the threat of hacking and protecting application quality control. Author Tim McCollum (2008) notes that there are many operational systems products offered to companies that "shields applications and data from outside attacks. These shields automatically run after installing or modifying the server software so that the shield matches the most-current configuration, preventing applications from acting outside their normal parameters" (McCollum, 2008).

Application control can further be completed...

Though many virus scanners will only detect viruses within its database leaving unknown viruses a risk, methods such as the use of patching applications to correct vulnerabilities as they appear prove to be vital in stopping viruses in their tracks. Further, password encryption at a company and individual level is a tool utilized to fight off the increasingly powerful hacking tool of password phishing.
Conclusion

In dealing with the issue of vulnerability and control in terms of software applications, it must be remembered that the issue is one that is ever-evolving and seemingly here to stay. Hackers will stop at nothing to crack into systems and applications in hope of accessing unauthorized information, and the only way to combat them is to study their tools and tactics. It is in doing so that application developers and users are more likely to spot areas within applications that are at risk of being corrupted by an outside source. It is apparent that in order to combat these hackers, diligence, education, and innovation are key in terms of application control. As applications become more sophisticated and complex, so do hackers, which is a key factor to remember in order to maintain quality assurance in software and application manufacturing.

References

Dalton, M., Kozyrakis, C. And Zeldovich, N. (2009). Preventing authentication and access control vulnerabilities in web applications. Network and Distributed Systems Security Symposium, 2009. Retrieved from: LexisNexis database.

Dhamankar, R., Eisenbarth, M., and King, J. (2009). Top security risks. SANS

Institute Report 2009. Retrieved from: ProQuest database.

McCollum, T. (2008). Applications control. The Internal Auditor. 59:2, 23-26. Retrieved

Software Applications Vs+Cs

Sources used in this document:
References

Dalton, M., Kozyrakis, C. And Zeldovich, N. (2009). Preventing authentication and access control vulnerabilities in web applications. Network and Distributed Systems Security Symposium, 2009. Retrieved from: LexisNexis database.

Dhamankar, R., Eisenbarth, M., and King, J. (2009). Top security risks. SANS

Institute Report 2009. Retrieved from: ProQuest database.

McCollum, T. (2008). Applications control. The Internal Auditor. 59:2, 23-26. Retrieved
Cite this Document:
Copy Bibliography Citation

Related Documents

Unix/Linux Systems Vulnerabilities and Controls
Words: 1233 Length: 4 Document Type: Essay

6.30. When there are no restrictions for unprivileged users and if the option for config_rdskernel configuration is set, hackers can write arbitrary values into kernel memory (by making specific types of socket function calls) since kernel software has not authenticated that the user address is actually found in the user segment. The lack of verification of the user address can provide hackers to gain privileges and access to areas that

System Vulnerabilities and Risk Reduction
Words: 960 Length: 3 Document Type: Essay

Cybersecurity LabsLab 7.1a: Identifying Common Risks, Threats, and Vulnerabilities in the Remote Access DomainCommon Risks, Threats, and Vulnerabilities in the Remote Access DomainIn the remote access domain, there are many risks, threats, and vulnerabilities that can compromise network security. One is unauthorized access in which attackers gain entry to sensitive data. Another concern would be phishing attacks, which use social engineering to steal user credentials (Krombholtz et al., 2015). Weak

Access Single Most Important Cybersecurity Vulnerability Facing It...
Words: 2445 Length: 8 Document Type: Research Paper

Cyber Security Vulnerabilities Single Most Important Cybersecurity Vulnerability Facing IT Managers Today Cyber Security Vulnerabilities Facing IT Managers Today At present, computers link people to their finances through online banking and a number of many online applications that offer access to accounts. In addition, they provide a connection to a broad variety of information, including social media, for instance, Face book, YouTube and Twitter. Interconnectivity of the systems have made it possible for

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Initiatives Require Bold Solutions, and
Words: 10456 Length: 38 Document Type: Capstone Project

The following diagram represents the structure of the idea. Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan Objectives of the Study The overarching objective of this study is to build a solid portfolio management application that connects all the local governments of Abu Dhabi emirates in ways that will allow them to collaborate on various projects pursuant to Plan Abu Dhabi 2030 through one unified system

Information Security Evaluation for OSI Systems a Case Study
Words: 4698 Length: 10 Document Type: Case Study

OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now