Management SQL Injection Incident Response Report

Project 3: SQL Injection Response Scenario: Faber College just learned that sensitive information has been stolen from a student information system and posted on the Web. After reviewing web server and database logs, the Faber IT security team believes that the source of the problem is a SQL injection vulnerability. The vulnerability appears to exist in a web application used by students to register for courses. As part of the incident response report to be submitted to Faber College’s management staff, your supervisor asks you to provide details about this type of vulnerability, how an attacker might exploit it, and methods of detection and removal. Submission for this Project: The Submission for this lab will be an MS Word document as a summary report A. This document shall be named: LastnameFirstname-Project03 B. This document shall follow the Professional paper APA 7 format. A page I use (almost exclusively when I use APA formatting) is Purdue Online Writing Lab APA 7 C. Length: 3 to 5 pages, Not including cover sheet and references. D.

Include a two-paragraph summary at the end of the project detailing what was completed and learned and any problems you encountered. Thoughts, suggestions, keep, trash, etc.

Tasks: 1. Research SQL injection attacks on the Internet to supplement your existing knowledge. Using the information you discovered during this research, in conjunction with what you learned in class, write an incident response report for Faber College’s management detailing the following information: 1.1. A non-technical description of SQL injection vulnerabilities intended for a college management audience. 1.2. The threat that SQL injection poses to the college’s data. Include three possible scenarios that describe how an attacker might conduct this type of attack, the information that they may be able to obtain, and how they might use it maliciously. 1.3. An implementation plan to fortify the college’s web applications against SQL injection attacks 1.4. A monitoring plan that will provide: 1.4.1.Early warning to developers and security administrators that a SQL injection vulnerability exists in a web application 1.4.2.Detection of successful and unsuccessful attempts to conduct SQL injection attacks against college systems 2. You are more than welcome to apply this report to your current employer’s network or a situation that is applicable to your situation. 3. Include a two-paragraph summary at the end of the Worksheet explaining what was completed and learned and any problems you encountered. 4. Submit this lab worksheet to Canvas for scoring.

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at