Vulnerability, threat, and security assessment on a web application
You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.
You are going to wrap up your work from the previous parts in Weeks 2, 4, and 6. These pieces will be combined with the one task below to make an overall complete Case Study/Lab Report.
Provide recommendations on mitigations that need to be put in place based on the Week 4 and Week 6 assignments.
Create a final completed Lab Report covering the following:
Introduction of the vulnerability site (business), what threats are against business and the effect is a web application is compromised (Week 2)
Vulnerability assessment (Week 4)
Here is a link to OWASP top 10 and each will explain how to prevent each vulnerability and should be included in the recommendation section: OWASP Top Ten | OWASP Foundation
Sample Answer
Final Completed Lab Report
1. Introduction of the Vulnerability Site (Business), Threats, and Effects of Compromise
Business Overview: We’re assessing “GlobalGadgets Online,” a hypothetical e-commerce platform specializing in a wide array of electronic devices. This business relies entirely on its web application for all key functions, including product catalog display, order processing, customer account management, secure payment handling, and real-time inventory tracking. Its brand reputation is built on consumer trust, the security of transactions, and efficient order fulfillment.
Threats Against GlobalGadgets Online’s Web Application:
Given its online nature and the sensitive data it handles, GlobalGadgets Online’s web application faces a multitude of cyber threats. These can originate from various malicious actors, including external hackers, competitive entities, or even internal disgruntled employees, as well as unintentional system flaws.
- Data Breaches: A primary concern is the unauthorized access and theft of sensitive customer information, such as credit card details, personally identifiable information (PII), and login credentials. Proprietary business data, like financial records or product designs, are also at risk.
- Financial Fraud: This includes unauthorized transactions, fraudulent chargebacks, and manipulation of payment gateways to misdirect or steal funds.
- Website Defacement/Tampering: Malicious alteration of the website’s visual content or functionality to damage the brand’s image or spread misinformation.