SlideShare a Scribd company logo
1 of 2
Download to read offline
Presence on the Web and Internet are critical components of just about any business, large or
small. However, having a website presence can increase the security risks and threats to which
an organization is subject.
What roles do security analysts play in preventing Web server, application, and database attacks?
How do these roles differ in different types of organizations?
Solution
the role of the security analyst while preventing web server,appliaction and database attacks:
1)in perpestive of webserver and application: he will monitor the logs and he may also use log
monitoring tools .here he will check what are the ip's accessing we pages. and also check
whether there are any intruders.
the main thing he will check about:
i)SQL injection
ii)brute drive protection
iii)malware
iv)cross website scripting
v)denial of service
vi)buffer overflow
in perpesctive of database :
here analyst will check in the follwoing areas
i)Excessive previlages
ii)database injections
iii)malware
iv)data loss
v)un managed sensitive data
these roles may differ in different organizations
=> some organizations may have as security analayst ,and some of the organization may
categorize them according to their requirement .for example ,some organization may have
security analyst for only webserver and applications, and database security analyst
=>if the organization in dealing big in databases related issues the he may categorize them
according to this requriement . so this type of organization requires database security analyst
=>if an organization is dealing with apllication related issues and database too then they need
them both..

More Related Content

Similar to Presence on the Web and Internet are critical components of just abo.pdf

Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
todd521
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Aditya K Sood
 

Similar to Presence on the Web and Internet are critical components of just abo.pdf (20)

Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
 
WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)
WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)
WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Importance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioImportance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.io
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
IRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability Scanner
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 

More from ezonesolutions

hi need help with this question, ignore the circles (f) Indicate .pdf
hi need help with this question, ignore the circles (f) Indicate .pdfhi need help with this question, ignore the circles (f) Indicate .pdf
hi need help with this question, ignore the circles (f) Indicate .pdf
ezonesolutions
 
Consider the current national debate about the revelation that top g.pdf
Consider the current national debate about the revelation that top g.pdfConsider the current national debate about the revelation that top g.pdf
Consider the current national debate about the revelation that top g.pdf
ezonesolutions
 
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdfCase Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
ezonesolutions
 
What are the main motives for establishing an international joint ve.pdf
What are the main motives for establishing an international joint ve.pdfWhat are the main motives for establishing an international joint ve.pdf
What are the main motives for establishing an international joint ve.pdf
ezonesolutions
 
4) Production in the country of StockVille can be characterized by th.pdf
4) Production in the country of StockVille can be characterized by th.pdf4) Production in the country of StockVille can be characterized by th.pdf
4) Production in the country of StockVille can be characterized by th.pdf
ezonesolutions
 
Related to Making the Connection] In the court case over whether any.pdf
Related to Making the Connection] In the court case over whether any.pdfRelated to Making the Connection] In the court case over whether any.pdf
Related to Making the Connection] In the court case over whether any.pdf
ezonesolutions
 

More from ezonesolutions (20)

hi need help with this question, ignore the circles (f) Indicate .pdf
hi need help with this question, ignore the circles (f) Indicate .pdfhi need help with this question, ignore the circles (f) Indicate .pdf
hi need help with this question, ignore the circles (f) Indicate .pdf
 
Explain TWO examples of fungal interactions with other speciesSo.pdf
Explain TWO examples of fungal interactions with other speciesSo.pdfExplain TWO examples of fungal interactions with other speciesSo.pdf
Explain TWO examples of fungal interactions with other speciesSo.pdf
 
DNA replicationTranscriptionTranslationPurposeWhere it occur.pdf
DNA replicationTranscriptionTranslationPurposeWhere it occur.pdfDNA replicationTranscriptionTranslationPurposeWhere it occur.pdf
DNA replicationTranscriptionTranslationPurposeWhere it occur.pdf
 
Does Microsoft directly disclose LinkedIn revenue for 2016 Explain .pdf
Does Microsoft directly disclose LinkedIn revenue for 2016 Explain .pdfDoes Microsoft directly disclose LinkedIn revenue for 2016 Explain .pdf
Does Microsoft directly disclose LinkedIn revenue for 2016 Explain .pdf
 
continuous, analytic, differentiableWhat is the relationship betwe.pdf
continuous, analytic, differentiableWhat is the relationship betwe.pdfcontinuous, analytic, differentiableWhat is the relationship betwe.pdf
continuous, analytic, differentiableWhat is the relationship betwe.pdf
 
Define the types of ultrasound pressure wavesSolutionUltrasoun.pdf
Define the types of ultrasound pressure wavesSolutionUltrasoun.pdfDefine the types of ultrasound pressure wavesSolutionUltrasoun.pdf
Define the types of ultrasound pressure wavesSolutionUltrasoun.pdf
 
Consider the current national debate about the revelation that top g.pdf
Consider the current national debate about the revelation that top g.pdfConsider the current national debate about the revelation that top g.pdf
Consider the current national debate about the revelation that top g.pdf
 
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdfCase Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
Case Study UrolithiasisCase PresentationDaniel, a thirty-two ye.pdf
 
A recombinant DNA was constructed by inserting the DNA of interest i.pdf
A recombinant DNA was constructed by inserting the DNA of interest i.pdfA recombinant DNA was constructed by inserting the DNA of interest i.pdf
A recombinant DNA was constructed by inserting the DNA of interest i.pdf
 
A conductor of length l lies along the x axis with current I in the +.pdf
A conductor of length l lies along the x axis with current I in the +.pdfA conductor of length l lies along the x axis with current I in the +.pdf
A conductor of length l lies along the x axis with current I in the +.pdf
 
What are the main motives for establishing an international joint ve.pdf
What are the main motives for establishing an international joint ve.pdfWhat are the main motives for establishing an international joint ve.pdf
What are the main motives for establishing an international joint ve.pdf
 
9 & 10 9. The study of behavioral finance has best helped explain .pdf
9 & 10 9. The study of behavioral finance has best helped explain .pdf9 & 10 9. The study of behavioral finance has best helped explain .pdf
9 & 10 9. The study of behavioral finance has best helped explain .pdf
 
Will Chinas economic success continue into the foreseeable future.pdf
Will Chinas economic success continue into the foreseeable future.pdfWill Chinas economic success continue into the foreseeable future.pdf
Will Chinas economic success continue into the foreseeable future.pdf
 
Which of the following ions would exhibit the greatest conductivity.pdf
Which of the following ions would exhibit the greatest conductivity.pdfWhich of the following ions would exhibit the greatest conductivity.pdf
Which of the following ions would exhibit the greatest conductivity.pdf
 
Which fault-tolerant-like system can back up media in much the same .pdf
Which fault-tolerant-like system can back up media in much the same .pdfWhich fault-tolerant-like system can back up media in much the same .pdf
Which fault-tolerant-like system can back up media in much the same .pdf
 
When may a federal court hear a caseSolutionFederal Court wil.pdf
When may a federal court hear a caseSolutionFederal Court wil.pdfWhen may a federal court hear a caseSolutionFederal Court wil.pdf
When may a federal court hear a caseSolutionFederal Court wil.pdf
 
4) Production in the country of StockVille can be characterized by th.pdf
4) Production in the country of StockVille can be characterized by th.pdf4) Production in the country of StockVille can be characterized by th.pdf
4) Production in the country of StockVille can be characterized by th.pdf
 
What is the pre-order traversal sequence for the above treeSolut.pdf
What is the pre-order traversal sequence for the above treeSolut.pdfWhat is the pre-order traversal sequence for the above treeSolut.pdf
What is the pre-order traversal sequence for the above treeSolut.pdf
 
Show that the class P, viewed as a set of languages is closed under c.pdf
Show that the class P, viewed as a set of languages is closed under c.pdfShow that the class P, viewed as a set of languages is closed under c.pdf
Show that the class P, viewed as a set of languages is closed under c.pdf
 
Related to Making the Connection] In the court case over whether any.pdf
Related to Making the Connection] In the court case over whether any.pdfRelated to Making the Connection] In the court case over whether any.pdf
Related to Making the Connection] In the court case over whether any.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 

Presence on the Web and Internet are critical components of just abo.pdf

  • 1. Presence on the Web and Internet are critical components of just about any business, large or small. However, having a website presence can increase the security risks and threats to which an organization is subject. What roles do security analysts play in preventing Web server, application, and database attacks? How do these roles differ in different types of organizations? Solution the role of the security analyst while preventing web server,appliaction and database attacks: 1)in perpestive of webserver and application: he will monitor the logs and he may also use log monitoring tools .here he will check what are the ip's accessing we pages. and also check whether there are any intruders. the main thing he will check about: i)SQL injection ii)brute drive protection iii)malware iv)cross website scripting v)denial of service vi)buffer overflow in perpesctive of database : here analyst will check in the follwoing areas i)Excessive previlages ii)database injections iii)malware iv)data loss v)un managed sensitive data these roles may differ in different organizations => some organizations may have as security analayst ,and some of the organization may categorize them according to their requirement .for example ,some organization may have security analyst for only webserver and applications, and database security analyst =>if the organization in dealing big in databases related issues the he may categorize them according to this requriement . so this type of organization requires database security analyst =>if an organization is dealing with apllication related issues and database too then they need