SlideShare a Scribd company logo
1 of 5
Download to read offline
Assignment:
Information security
Submitted to:
Mam Quratulain
Submitted by:
M.waqas zahid
Roll No:
BS-IT-19-59
Class:
BS-Information Technology
(Evening)
Dated:
23-03-2021
Q: Visit any website and list security parameters you find on that
website. list them all also site name and purpose of the site?
ANSWER:
www.ptcl.com.pk
1.Use HTTPS :
HTTPS is a protocol used to provide security over the Internet. HTTPS
guarantees that users are talking to the server they expect, and that nobody else
can intercept or change the content they're seeing in transit.
2.Record User Access and Administrative Privileges:
Site name
Security parameters
1.parameters’ Threats Consequences
INTEGRTY .1.Modification of user data, 1.Loss of information .
memory, message traffic in 2.Compromise of machine.
transmit.. 3.Vulnerability to all other
2.Trojan horse browser. threats.
Confidentiality 1. Eavesdropping on the net. 1. Loss of information and
2. Theft of information and privacy
data from server and client.
Denial of service 1. Killing of user threads. 1. Disupptive
2. Flooding machine with 2. Annoying
bogus requests. 3. Prevent user from
3. Filling up disk or memory. getting work done.
4. Isolating machine by DNS
attacks
Authentication 1. Impersonation of legitimate 1.Misrepresentation of
Users . user
2. Data forgery. 2. Belief that false
information is valid
Watch out for SQL injection:
SQL injection attacks are when an attacker uses a web form field or URL
parameter to gain access to or manipulate your database. When you
use standard Transact SQL it is easy to unknowingly insert rogue code
into your query that could be used to change tables, get information
and delete data.
Check your passwords:
Everyone knows they should use complex passwords, but that doesn’t
mean they always do. It is crucial to use strong passwords to your
server and website admin area, but equally also important to insist on
good password practices for your users to protect the security of their
accounts.
Keep software up to date:
It may seem obvious, but ensuring you keep all software up to date is
vital in keeping your site secure. This applies to both the server
operating system and any software you may be running on your
website such as a CMS or forum.

More Related Content

Similar to information security 2.pdf

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguide
David Kwak
 

Similar to information security 2.pdf (20)

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
<marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee><marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee>
 
" onclick="alert(1)
" onclick="alert(1)" onclick="alert(1)
" onclick="alert(1)
 
AW-Infs201101067.pptx
AW-Infs201101067.pptxAW-Infs201101067.pptx
AW-Infs201101067.pptx
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention Methods
 
owasp top 10.ppt
owasp top 10.pptowasp top 10.ppt
owasp top 10.ppt
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Securing mule
Securing   muleSecuring   mule
Securing mule
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Client /server security overview
Client /server security overviewClient /server security overview
Client /server security overview
 
Paper2
Paper2Paper2
Paper2
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguide
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

information security 2.pdf

  • 1. Assignment: Information security Submitted to: Mam Quratulain Submitted by: M.waqas zahid Roll No: BS-IT-19-59 Class: BS-Information Technology (Evening) Dated: 23-03-2021
  • 2. Q: Visit any website and list security parameters you find on that website. list them all also site name and purpose of the site? ANSWER: www.ptcl.com.pk 1.Use HTTPS : HTTPS is a protocol used to provide security over the Internet. HTTPS guarantees that users are talking to the server they expect, and that nobody else can intercept or change the content they're seeing in transit. 2.Record User Access and Administrative Privileges: Site name Security parameters
  • 3. 1.parameters’ Threats Consequences INTEGRTY .1.Modification of user data, 1.Loss of information . memory, message traffic in 2.Compromise of machine. transmit.. 3.Vulnerability to all other 2.Trojan horse browser. threats. Confidentiality 1. Eavesdropping on the net. 1. Loss of information and 2. Theft of information and privacy data from server and client. Denial of service 1. Killing of user threads. 1. Disupptive 2. Flooding machine with 2. Annoying bogus requests. 3. Prevent user from 3. Filling up disk or memory. getting work done. 4. Isolating machine by DNS attacks Authentication 1. Impersonation of legitimate 1.Misrepresentation of Users . user 2. Data forgery. 2. Belief that false information is valid
  • 4. Watch out for SQL injection: SQL injection attacks are when an attacker uses a web form field or URL parameter to gain access to or manipulate your database. When you use standard Transact SQL it is easy to unknowingly insert rogue code into your query that could be used to change tables, get information and delete data. Check your passwords: Everyone knows they should use complex passwords, but that doesn’t mean they always do. It is crucial to use strong passwords to your server and website admin area, but equally also important to insist on good password practices for your users to protect the security of their accounts. Keep software up to date:
  • 5. It may seem obvious, but ensuring you keep all software up to date is vital in keeping your site secure. This applies to both the server operating system and any software you may be running on your website such as a CMS or forum.