Week 7 Assignment
Week 7 Assignment
Here are five commonly used cybersecurity tools, along with their primary functionalities and
contributions to network security:
1. Firewalls:
- Functionality: Firewalls monitor and control incoming and outgoing network traffic based on
predetermined security rules.
- Contribution: They act as a barrier between trusted internal networks and untrusted external
networks, helping to prevent unauthorized access and attacks.
- Functionality: IDS monitor network traffic for suspicious activity and alert administrators to potential
threats.
-Contribution: By identifying and responding to anomalies or known attack patterns, IDS enhance the
ability to detect intrusions early, allowing for a quicker response.
3. Vulnerability Scanners:
- Functionality: These tools assess systems and networks for known vulnerabilities and
misconfigurations.
- Contribution: Regular scanning helps organizations identify and remediate security weaknesses
before they can be exploited by attackers.
4. Antivirus/Anti-malware Software:
- Functionality: This software detects, quarantines, and removes malicious software (malware) from
devices.
- Contribution: By preventing malware infections, it helps maintain the integrity and confidentiality of
sensitive data within networks.
- Functionality: SIEM tools collect and analyze security data from across the organization’s IT
environment in real time.
- Contribution: They provide comprehensive visibility into security events, enabling rapid incident
response and compliance reporting, thus strengthening overall security posture.
[2]
Let's say a vulnerability scanner report reveals several critical vulnerabilities in a web application,
including:
1. SQL Injection: The application allows unfiltered user input, making it susceptible to attackers
manipulating SQL queries.
2. Outdated Software: The application is running on an outdated version of a framework with known
security flaws.
Security Implications:
- SQL Injection: This vulnerability can lead to unauthorized access to the database, allowing attackers to
view, modify, or delete sensitive data.
- Outdated Software: Using outdated software increases the risk of exploitation from known
vulnerabilities that may not have been patched, potentially compromising the entire system.
Recommended Actions:
1. Implement Input Validation and Parameterized Queries: To mitigate the SQL injection risk, ensure
that all user inputs are properly validated and utilize parameterized queries to prevent direct
manipulation of SQL statements.
2. Update Software and Apply Patches: Regularly update the application and its underlying frameworks
to the latest versions. This helps close known vulnerabilities and strengthens overall security.
Taking these actions will significantly reduce the risk of exploitation and improve the application's
security posture.