Project #67285 - IP Week 5

Your company developed an Order Entry Intranet application for its sales personnel to enter orders for processing on behalf of their customers. Now your company wants to make a version of this Order Entry application accessible over the Internet so that customers can enter their orders directly by themselves without the assistance of a sales person.

The company CEO learned that input validation of user entered data to Order Entry Internet web application is one major security risk that the company must address comprehensively and thoroughly. He asked you, as the resident security expert, to propose several techniques to protect against and secure user input to the Order Entry Internet web application.

Go to the Web Resources for this Unit and download the vulnerability scanner application. After installing evaluate its features and answer in a Word document the following: 

  • Discuss five application vulnerabilities it could possibly detect in the Order Entry application.
  • Discuss three database vulnerabilities it could possibly detect in the Order Entry application.
  • Compare its features with the features of Fiddler debugging tool that you used for Individual Project for Unit 4.

Subject Computer
Due By (Pacific Time) 04/24/2015 06:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy