SlideShare a Scribd company logo
A Security Reinforcement
Project
COURSE/BLOCK: BSIT 3B
NAME OF WEBSITE: OTSOMOTO
GROUP MEMBERS: MA. LIANNE ISABEL D. TALENTO
JESSIE JAMES D. SEDEÑO
ADRIAN SAMUEL S. OLLERES
Part 1
Security Reinforcement
TABLE OF CONTENT
TOPICS SLIDES NUMBER
WEBSITE NAME 4
Website Mission / Vision 5
Project Overview
ExistingWebSystemVulnerabilities
How SecurityMeasuresisImplemented
MitigationActionImplemented
ConclusionandFutureEnhancements
Part 2
White Hat Test for the Reinforced Website
IdentifiedVulnerability
Recommendation
DIGITAL WAVE
This electronic commerce site offers a Social Media Marketing, Email
Marketing, Content Marketing. Our platform is dedicated to helping the users to
acquire the skills and knowledge necessary to succeed in the world of digital
marketing, particularly in the realm of e-commerce. Customers can select their
preferred skills to acquire from Social Media, Email, Content Marketing. In addition,
this site contains all the information needed to know to encourage a customer to
make a purchase. Product descriptions were included, while in terms of the mode of
payment, customers have multiple choices, such as GCash, Paypal and Paymaya.
Mission Vision
At our core, we are on a mission to
empower individuals in the dynamic
landscape of digital marketing within the
e-commerce realm. We strive to provide a
comprehensive electronic commerce
platform that specializes in Social Media
Marketing, Email Marketing, and Content
Marketing. Our mission is to equip users
with the skills and knowledge essential for
thriving in the digital marketing sphere,
fostering their success in the world of e-
commerce.
We envision a future where every individual
aspiring to excel in digital marketing finds a
dedicated and resourceful platform. Our
vision is to be the foremost destination for
users seeking to acquire and enhance their
skills in Social Media, Email, and Content
Marketing. We aim to create an
environment where users not only gain
knowledge but also find all the information
required to make informed purchase
decisions. Our vision extends to providing a
seamless experience, offering multiple
payment options such as GCash, Paypal, and
Paymaya, ensuring accessibility and
convenience for our valued customers.
Project Overview
Scope
The digital wave spans diverse fields - digital marketing, e-
commerce, social media, cloud computing, AI, and big data. It
opens avenues for businesses to connect with customers
through digital channels, fostering new opportunities. This
wave facilitates collaboration and communication globally,
transcending geographic and time constraints. Across
industries like healthcare, education, finance, and
entertainment, the digital wave transforms operations with
advanced tools and resources.
Goals
Leverage the digital wave's power for effective customer
engagement, global collaboration, and transformative industry
impact across digital marketing, e-commerce, and various sectors.
Our digital wave initiative aims to elevate customer engagement, global collaboration, and industry
impact. Key strategies involve leveraging digital channels and technologies, supported by a clear
implementation plan with timelines and milestones. We've identified specific performance
indicators to measure success and outlined risk mitigation strategies. The documentation covers
resource needs, tools, and technologies, as well as considerations for training and support. This
concise guide provides stakeholders with a clear roadmap for the initiative's success, summarizing
key points and outlining next steps.
Documentation
Existing Web System Vulnerabilities
Vulnerability Screenshots
Injection Attacks
Cross-Site Scripting (XSS)
Authentication Issues
Teacher’s Note:
Actual Picture of the Front-End and
Back-End/Code that is susceptible to
any threat
Existing Web System Vulnerabilities
Vulnerability Description
Injection Attacks Identify and prevent SQL and code injections
that can lead to data breaches and unauthorized
access.
Cross-Site Scripting (XSS) Detect and mitigate XSS vulnerabilities to
prevent malicious scripts from running in users'
browsers.
Authentication Issues Strengthen authentication mechanisms to
prevent unauthorized access and enhance user
account security.
Teacher’s Note:
This is just a sample students are free
to give their own identified
vulnerability minimum of 3
maximum of 6
How Security Measures is Implemented
1 Secure Coding Practices
Enforce coding practices like input validation, output encoding, and secure API
implementation to prevent common vulnerabilities.
2 Access Controls
Implement granular access controls and role-based permissions to restrict
unauthorized access to sensitive resources.
3 Encryption
Apply strong encryption algorithms to protect data both at rest and in transit,
ensuring confidentiality and integrity.
Mitigation Action Implemented
Vulnerability Screenshots
Injection Attacks
Cross-Site Scripting (XSS)
Authentication Issues
Teacher’s Note:
Show your improved code that could
possible counter the identified
vulnerability. And Provide
Explanation how it work
Conclusion and Future
Enhancements
By reinforcing the security of the existing web system, we have mitigated
vulnerabilities, protected user data, and ensured system integrity. Further
enhancements can focus on threat intelligence integration and proactive
security measures to stay ahead of emerging threats.
Part 2
White Hat Test for the Reinforced Website
WHITE HAT TESTING
Name of Website for White Hat
Testing
<Screenshot of Website for White Hat Test>
Identified Vulnerability
1.
2.
3.. …
<Screenshot of Website for White Hat Test>
A-Security-Reinforcement-Project Template.pptx

More Related Content

Similar to A-Security-Reinforcement-Project Template.pptx

AnkitaGoyal-Resume
AnkitaGoyal-ResumeAnkitaGoyal-Resume
AnkitaGoyal-Resume
Ankita Goyal
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
anhcrowley
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
khanpaulita
 

Similar to A-Security-Reinforcement-Project Template.pptx (20)

Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
 
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
 
Thesis
ThesisThesis
Thesis
 
AnkitaGoyal-Resume
AnkitaGoyal-ResumeAnkitaGoyal-Resume
AnkitaGoyal-Resume
 
A Guide Developing an E-Commerce App Like Boxed
A Guide Developing an E-Commerce App Like BoxedA Guide Developing an E-Commerce App Like Boxed
A Guide Developing an E-Commerce App Like Boxed
 
Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
Marketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers todayMarketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers today
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?
 
Client review-portfolio
Client review-portfolioClient review-portfolio
Client review-portfolio
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Management Science Company Report Part II
Management Science Company Report Part IIManagement Science Company Report Part II
Management Science Company Report Part II
 
COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
 
Ideaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application DevelopmentIdeaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application Development
 
I-Bytes Financial services Industry
I-Bytes Financial services IndustryI-Bytes Financial services Industry
I-Bytes Financial services Industry
 
Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

A-Security-Reinforcement-Project Template.pptx

  • 1. A Security Reinforcement Project COURSE/BLOCK: BSIT 3B NAME OF WEBSITE: OTSOMOTO GROUP MEMBERS: MA. LIANNE ISABEL D. TALENTO JESSIE JAMES D. SEDEÑO ADRIAN SAMUEL S. OLLERES
  • 3. TABLE OF CONTENT TOPICS SLIDES NUMBER WEBSITE NAME 4 Website Mission / Vision 5 Project Overview ExistingWebSystemVulnerabilities How SecurityMeasuresisImplemented MitigationActionImplemented ConclusionandFutureEnhancements Part 2 White Hat Test for the Reinforced Website IdentifiedVulnerability Recommendation
  • 4. DIGITAL WAVE This electronic commerce site offers a Social Media Marketing, Email Marketing, Content Marketing. Our platform is dedicated to helping the users to acquire the skills and knowledge necessary to succeed in the world of digital marketing, particularly in the realm of e-commerce. Customers can select their preferred skills to acquire from Social Media, Email, Content Marketing. In addition, this site contains all the information needed to know to encourage a customer to make a purchase. Product descriptions were included, while in terms of the mode of payment, customers have multiple choices, such as GCash, Paypal and Paymaya.
  • 5. Mission Vision At our core, we are on a mission to empower individuals in the dynamic landscape of digital marketing within the e-commerce realm. We strive to provide a comprehensive electronic commerce platform that specializes in Social Media Marketing, Email Marketing, and Content Marketing. Our mission is to equip users with the skills and knowledge essential for thriving in the digital marketing sphere, fostering their success in the world of e- commerce. We envision a future where every individual aspiring to excel in digital marketing finds a dedicated and resourceful platform. Our vision is to be the foremost destination for users seeking to acquire and enhance their skills in Social Media, Email, and Content Marketing. We aim to create an environment where users not only gain knowledge but also find all the information required to make informed purchase decisions. Our vision extends to providing a seamless experience, offering multiple payment options such as GCash, Paypal, and Paymaya, ensuring accessibility and convenience for our valued customers.
  • 6. Project Overview Scope The digital wave spans diverse fields - digital marketing, e- commerce, social media, cloud computing, AI, and big data. It opens avenues for businesses to connect with customers through digital channels, fostering new opportunities. This wave facilitates collaboration and communication globally, transcending geographic and time constraints. Across industries like healthcare, education, finance, and entertainment, the digital wave transforms operations with advanced tools and resources. Goals Leverage the digital wave's power for effective customer engagement, global collaboration, and transformative industry impact across digital marketing, e-commerce, and various sectors. Our digital wave initiative aims to elevate customer engagement, global collaboration, and industry impact. Key strategies involve leveraging digital channels and technologies, supported by a clear implementation plan with timelines and milestones. We've identified specific performance indicators to measure success and outlined risk mitigation strategies. The documentation covers resource needs, tools, and technologies, as well as considerations for training and support. This concise guide provides stakeholders with a clear roadmap for the initiative's success, summarizing key points and outlining next steps. Documentation
  • 7. Existing Web System Vulnerabilities Vulnerability Screenshots Injection Attacks Cross-Site Scripting (XSS) Authentication Issues Teacher’s Note: Actual Picture of the Front-End and Back-End/Code that is susceptible to any threat
  • 8. Existing Web System Vulnerabilities Vulnerability Description Injection Attacks Identify and prevent SQL and code injections that can lead to data breaches and unauthorized access. Cross-Site Scripting (XSS) Detect and mitigate XSS vulnerabilities to prevent malicious scripts from running in users' browsers. Authentication Issues Strengthen authentication mechanisms to prevent unauthorized access and enhance user account security. Teacher’s Note: This is just a sample students are free to give their own identified vulnerability minimum of 3 maximum of 6
  • 9. How Security Measures is Implemented 1 Secure Coding Practices Enforce coding practices like input validation, output encoding, and secure API implementation to prevent common vulnerabilities. 2 Access Controls Implement granular access controls and role-based permissions to restrict unauthorized access to sensitive resources. 3 Encryption Apply strong encryption algorithms to protect data both at rest and in transit, ensuring confidentiality and integrity.
  • 10. Mitigation Action Implemented Vulnerability Screenshots Injection Attacks Cross-Site Scripting (XSS) Authentication Issues Teacher’s Note: Show your improved code that could possible counter the identified vulnerability. And Provide Explanation how it work
  • 11. Conclusion and Future Enhancements By reinforcing the security of the existing web system, we have mitigated vulnerabilities, protected user data, and ensured system integrity. Further enhancements can focus on threat intelligence integration and proactive security measures to stay ahead of emerging threats.
  • 12. Part 2 White Hat Test for the Reinforced Website
  • 14. Name of Website for White Hat Testing <Screenshot of Website for White Hat Test>
  • 15. Identified Vulnerability 1. 2. 3.. … <Screenshot of Website for White Hat Test>