SlideShare a Scribd company logo
1 of 2
Common Weakness Enumeration Assignment
CIS244 – Network Security
Due: by 11:59pm EST on Sunday at the end of Unit 2
Write a paper discussing at least 7 Common Weakness
Enumeration (CWE). Discuss how you would correct these
issues in development of a software application or web
application. Look at the Open Web Application Security Project
(OWASP) and provide which tools would you use to test web
applications for vulnerabilities.
The requirements for your paper are:
Compare and contrast a minimum of 7 CWEs.
Discuss how these weaknesses could be corrected.
Identify at least 3 tools that could be used to test web
applications for vulnerabilities.
APA formatted including title page, reference page, and in-text
citations.
Length of 2-3 pages, excuding the title and reference pages.
Minimum of 2 scholarly resources
Common Weakness Enumeration AssignmentCIS244 – Network Secur.docx

More Related Content

Similar to Common Weakness Enumeration AssignmentCIS244 – Network Secur.docx

Operations: Production Readiness Review – How to stop bad things from Happening
Operations: Production Readiness Review – How to stop bad things from HappeningOperations: Production Readiness Review – How to stop bad things from Happening
Operations: Production Readiness Review – How to stop bad things from HappeningAmazon Web Services
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Detect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsDetect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
DETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSDETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSijcseit
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesKaashivInfoTech Company
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production ReadinessAmazon Web Services
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approachAntonio Parata
 

Similar to Common Weakness Enumeration AssignmentCIS244 – Network Secur.docx (11)

Operations: Production Readiness Review – How to stop bad things from Happening
Operations: Production Readiness Review – How to stop bad things from HappeningOperations: Production Readiness Review – How to stop bad things from Happening
Operations: Production Readiness Review – How to stop bad things from Happening
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Dependency check
Dependency checkDependency check
Dependency check
 
Detect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsDetect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvs
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
DETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSDETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVS
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production Readiness
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
 
A26001006
A26001006A26001006
A26001006
 

More from cargillfilberto

COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxcargillfilberto
 
Common Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxCommon Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxcargillfilberto
 
Common symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxCommon symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxcargillfilberto
 
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxCommon Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxcargillfilberto
 
Commercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxCommercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxcargillfilberto
 
Common sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxCommon sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxcargillfilberto
 
Common Product Yields VEGETABLES Acorn Squash.docx
Common Product Yields  VEGETABLES Acorn Squash.docxCommon Product Yields  VEGETABLES Acorn Squash.docx
Common Product Yields VEGETABLES Acorn Squash.docxcargillfilberto
 
Common Law Strict Liability Introduction Strict liabilit.docx
Common Law Strict Liability Introduction  Strict liabilit.docxCommon Law Strict Liability Introduction  Strict liabilit.docx
Common Law Strict Liability Introduction Strict liabilit.docxcargillfilberto
 
common core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcommon core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcargillfilberto
 
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxCOMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxcargillfilberto
 
Common CoreCasey BerryEnglish 200August .docx
Common CoreCasey BerryEnglish  200August .docxCommon CoreCasey BerryEnglish  200August .docx
Common CoreCasey BerryEnglish 200August .docxcargillfilberto
 
Common Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxCommon Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxcargillfilberto
 
Common Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxCommon Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxcargillfilberto
 
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxCommon Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxcargillfilberto
 
Common Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxCommon Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxcargillfilberto
 
Common Assignment Essay Objective of this Assignment.docx
Common Assignment Essay   Objective of this Assignment.docxCommon Assignment Essay   Objective of this Assignment.docx
Common Assignment Essay Objective of this Assignment.docxcargillfilberto
 
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxCommittee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxcargillfilberto
 
Committees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxCommittees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxcargillfilberto
 
Commitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxCommitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxcargillfilberto
 

More from cargillfilberto (20)

COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
 
Common Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docxCommon Mistakes I see on this paper are1. Using summaries and .docx
Common Mistakes I see on this paper are1. Using summaries and .docx
 
Common symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docxCommon symptoms of memory changes during the lifetime in healthy.docx
Common symptoms of memory changes during the lifetime in healthy.docx
 
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docxCommon Surface-Level Issues for the Informative Essay(Note Thes.docx
Common Surface-Level Issues for the Informative Essay(Note Thes.docx
 
Commercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docxCommercial Space TravelThere are about a half dozen commercial s.docx
Commercial Space TravelThere are about a half dozen commercial s.docx
 
Common sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docxCommon sports-relatedshoulder injuriesShoulder pain is.docx
Common sports-relatedshoulder injuriesShoulder pain is.docx
 
Common Product Yields VEGETABLES Acorn Squash.docx
Common Product Yields  VEGETABLES Acorn Squash.docxCommon Product Yields  VEGETABLES Acorn Squash.docx
Common Product Yields VEGETABLES Acorn Squash.docx
 
Common Law Strict Liability Introduction Strict liabilit.docx
Common Law Strict Liability Introduction  Strict liabilit.docxCommon Law Strict Liability Introduction  Strict liabilit.docx
Common Law Strict Liability Introduction Strict liabilit.docx
 
Common Core .docx
Common Core                                                       .docxCommon Core                                                       .docx
Common Core .docx
 
common core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docxcommon core state stanDarDs For english Language arts & .docx
common core state stanDarDs For english Language arts & .docx
 
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docxCOMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
 
Common CoreCasey BerryEnglish 200August .docx
Common CoreCasey BerryEnglish  200August .docxCommon CoreCasey BerryEnglish  200August .docx
Common CoreCasey BerryEnglish 200August .docx
 
Common Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docxCommon Holy Days in Jewish Religious TraditionsComplete th.docx
Common Holy Days in Jewish Religious TraditionsComplete th.docx
 
Common Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docxCommon Hacking Techniques You Should Know AboutHacking is th.docx
Common Hacking Techniques You Should Know AboutHacking is th.docx
 
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docxCommon Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
Common Pool Resource ManagementKim Townsend SUS 350 Sustai.docx
 
Common Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docxCommon Assignment Prepare a written analysis of the impact of the.docx
Common Assignment Prepare a written analysis of the impact of the.docx
 
Common Assignment Essay Objective of this Assignment.docx
Common Assignment Essay   Objective of this Assignment.docxCommon Assignment Essay   Objective of this Assignment.docx
Common Assignment Essay Objective of this Assignment.docx
 
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docxCommittee on Enhancing Federal Healthcare Quality ProgramsJa.docx
Committee on Enhancing Federal Healthcare Quality ProgramsJa.docx
 
Committees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docxCommittees1. To provide for greater transparency in the HU.docx
Committees1. To provide for greater transparency in the HU.docx
 
Commitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docxCommitment to ProfessionalismCommitment to Professionalism..docx
Commitment to ProfessionalismCommitment to Professionalism..docx
 

Recently uploaded

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 

Common Weakness Enumeration AssignmentCIS244 – Network Secur.docx

  • 1. Common Weakness Enumeration Assignment CIS244 – Network Security Due: by 11:59pm EST on Sunday at the end of Unit 2 Write a paper discussing at least 7 Common Weakness Enumeration (CWE). Discuss how you would correct these issues in development of a software application or web application. Look at the Open Web Application Security Project (OWASP) and provide which tools would you use to test web applications for vulnerabilities. The requirements for your paper are: Compare and contrast a minimum of 7 CWEs. Discuss how these weaknesses could be corrected. Identify at least 3 tools that could be used to test web applications for vulnerabilities. APA formatted including title page, reference page, and in-text citations. Length of 2-3 pages, excuding the title and reference pages. Minimum of 2 scholarly resources