Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


Strayer University Challenges and Risks of Web Application Discussion

Strayer University Challenges and Risks of Web Application Discussion

Question Description

I’m working on a computer science discussion question and need support to help me study.

Some organizations are moving their business applications to the cloud to reduce their infrastructure costs. In some instances, organizations use web applications, which introduces security challenges.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on cloud computing and the risks associated with it. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Explain the challenges and risks web applications face.
  • Describe the methods organizations use to mitigate these challenges and risks.
  • Provide full citations and references, formatted according to Strayer Writing Standards.
    • For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

In 60 to 75 words, please respondto students response below:

Hello Professor and Class,


In the book on pages 290-291 it says:

Some challenges and risks web applications face would be injection. SQL injection where someones code tricks the website or server into thinking it is coming from the user or exposes login or credentials. Broken Authentication- Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys or session tokens. Sensitive data exposure- That is exactly what it says it is and it can happen several different ways. XML external entity- This type of attack parses XML input. Broken Access Control- I think you can put privilege creep into this also. Security misconfiguration- This can only be handled by admins and network admins. The correct configuration is crucial for proper security. Cross-site scripting. This occurs whenever an application includes untrusted data which should never be the case today. Things like Adobe flash and other applications like that are examples. Insufficient logging and monitoring-This is crucial just like the proper configuration.


On the bottom of page 291 it states the most important tool in countering web application threats is a web application firewall. This is a firewall that monitors, filters or blocks data packets as they travel to and from a web application .

It also says provide confidentiality and integrity protection for configuration files and other information specific to the application by isolating the files from the other programs on the server and restricting file access. Website content should similarly have confidentiality and integrity protections. Oversight in the form of regular content review is needed to ensure that the content is not inappropriate and is accurate.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Gold Grades only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Gold Grades are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Gold Grades is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Gold Grades, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.