Lesson 6 Securing Web Applications

Lesson 6 Securing Web Applications -...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Stephen L Coates Jr (SteCoa8799) <Wednesday, December 08, 2010> CIS 212 Network Security Concepts Lesson 6- Securing Web Applications Assignment Activity 6-2      Discussing Buffer Overflow Attack prevention     1. True or False? A buffer overflow attack attempts to overload a system’s processor with too  much information. False 2. In which types of code could buffer overflows be a concern? A) Operating System B) Web Application C) Firmware D) Shareware 3. Considering the possible effects of a buffer overflow attack, what advantages might there be  in spending code development time to secure applications from these vulnerabilities? Increased customer satisfaction and loyalty, with fewer security patches and bug fixes.  4. True or False? Enabling the No execute bit prevents applications from accessing the  designated region of memory. False
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Activity 6-3      Implementing ActiveX or Java Security     1. In What case might a developer choose to distribute an unsigned ActiveX control? C) for a small, Controlled internal Test
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

Lesson 6 Securing Web Applications -...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online