Vishwa 3
Vishwa 3
Brook S. E. Schoenfield
March 2,2025
2
Introduction: This report discusses the security evaluation for Vestige, an online
software company specializing in selling advertisements for its parent company's magazine.
Since Vestige's system had to connect to the parent company's database in order to handle
customer advertisements and payment transactions, its main goal was to make sure it was
secure.
security, and web application security were covered in these chapters. In this report, I have
System Architecture and Initial Assessment: The first step in the assessment
management begins with thorough reconnaissance and risk assessment to identify potential
attack vectors before they are exploited (Schoenfield, 2015, Chapter 3). Potential adversaries
exposed services. In the 2017 Equifax hack, hackers discovered and took advantage of an
For Vestige, I used network scanning tools like Nmap to map open ports and services.
Through this process, I was able to identify possible threat vectors and understand the
systems' external exposure. I recognized these potential attack risks early to take preventative
system's architecture, I looked for security loopholes using vulnerability scanning tools like
Nessus or OpenVAS to check for known vulnerabilities, outdated software, and configuration
errors.
3
happened in the 2014 heart bleed bug, which is a prime example. Due to this OpenSSL
library bug, hackers were able to steal private data, such as encryption keys and passwords
(Fruhlinger, 2022).
I did some scans on the vestiges system to find similar vulnerabilities and make sure
for submitting ads and collecting payments, I paid close attention to web application security.
Cyber attackers often target web applications, such as the Yahoo data breach, where millions
I tested Vestige's web application for common vulnerabilities like cross-site scripting
(XSS), SQL injection, and broken authentication tools like OWASP ZAP and Burp Suite.
Because it enables attackers to manipulate the database and cause data breaches, especially
SQL injection, which is risky, by adhering to the top 10 OWASP security guidelines, the
vestiges authentication, session management, and data handling procedures can be enhanced
and evaluated.
vulnerability analysis. This phase was critical in determining whether vulnerabilities could be
exploited by hackers.
vulnerability to exploit the whole system (Alexander, 2024). As per this example, I have
decided to make some ethical hacking attempts for Vestige using Metasploit to see if system
loopholes could be used to gain unauthorized access. This step provided evidence that flaws
Risk Assessment and Remediation Plan: After detecting the vulnerabilities in the
vulnerabilities according to their impact on the system and their level of severity (high,
medium, and low). One important takeaway from the Equifax Hack was that serious data
security patches, improving input validation to stop SQL injections, and encrypting sensitive
penetration testing, network security and web application security, I was able to pinpoint
This exercise was an invaluable learning experience, which gave me the opportunity
online system's security by utilizing knowledge from Schoenfield Brooke's security concepts.
The suggested changes helped lower risks, safeguard client information, and guarantee
References
https://medium.com/@InfoSecDion/digital-forensics-project-on-wannacry-
ransomware-dfir-eb54ee48fda2
Fruhlinger, J. (2020, February 12). Equifax Data Breach FAQ: What happened, who was
https://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-
who-was-affected-what-was-the-impact.html
Fruhlinger, J. (2022, September 12). The heartbleed bug: How a flaw in openssl caused a
heartbleed-bug-how-a-flaw-in-openssl-caused-a-security-crisis.html
https://reader2.yuzu.com/books/9781040054826