Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company In this phase of the proje

Running Head: QUALITY WEB DESIGN SECURITY WEAKNESS 0

Quality Web Design Security Weakness

Cedrick Greer

Dr. K

SEC571

5/24/20








Quality web Design Company is a speculated firm that is typically involved in making websites and content designs for all types of business. In a real sense, the company has a doped a very network control that protects its content over the network processes. It has adopted well-defined procedures of development life cycle and designing; nevertheless, the business process had opted to use a Microsoft Visual Studio Team Foundation Service (TFS) server. The integration, in this case, is used to monitor development and quality assurance. Besides that, it has security controls that use a standard corporate security practice (Beth Hendricks, 2017).

On a broader scope of analysis, the company is actively involved. For a fact, businesses have experienced various transformations and are now in the quest for advanced innovative technology that will accommodate development in the security and web development processes. The database lacks an access control procedure and independence of application programs being created. This affects the nature of the security policy and network infrastructure of the programmer or defined use of the system. These two weaknesses in the company pose a risk that can have a negative implication on the regular running of processes in the file-based order and companies' point of dispatch. In the spectrum that the company has put in place, the vulnerability associated with the use of the Microsoft Visual Studio Team Foundation Service (TFS) server includes when code protection and reservation, information sensitivity, and transmission protocol from one point of anther through the database. To make it more word, the database being used has been segmented. The poses more risk to and expose vulnerability. It's also a threat to substantial design that has been undertaken by the company to code great and useful websites o esteem customers (Gertz & Jajodia, 2017).

These security weaknesses put the company in a trial based on the intensive that the attack can take and the implication it can have in the regular running of QWD. The firm has failed to recognize the roles of a secured database as the center of organizational security processes. When the security policy has not been fully launched, there is a high possibility of having a breach of data and patches of data packets violated. There is a very high possibility that this kind of threat will occur in the company. Exploit software vulnerability and, in this case use of 2008 domain controller risk files and server service. The model being used in large extend, their security loophole is made of limited charges of access controls and credential that manages data. Besides, the company has not rolled out a plan of policy that will manage and audit secondary access application software such as phones and PDA devices. This creates room for privileges escalation to more files that necessity and low level of corporate policy management would do. The packet of sniffing connection in the database launches an attack that has a massive effect on the database and entities of the web server’s preparation processes. The likelihood of the attack is so apparent considering a web company has most of its services offered through digitalized protocols and online-based communication. The company has not constituted its database; in this sees they do not have full control over. Limited security and procedures to files file-based elements expose liabilities of the user the third part access (Josiah Bussing, 2018).

The software and policy weakness that has been mentioned above affects the critical mission of the business. One of the unfortunate incidents that the company is likely to suffer is online vandalism, where hacker breaches data and in this codes that have been prepared to create business websites. When hacker accesses the companies system, they can be above to obtain sensitive information that is ending for business purposes. When such has been experienced, there is a most likely factor that can cause loss as the business tries to attain a sustainable recovery procedure from the attack that has already been launched. L2TP/IPSec VPN should not only monitor data but should be activated with access control processes that deny and report any form of resource access that is not defined in the database. The database should have the ability to launch an integrated eternally connected service based on the security control procedures that will put the profile of the organization at risk (Maurer, 2019).

Quality Web Design is a company that has been able to secure a scope in the market. Web server creating roles has been a significant move in the client companies as they seek to the digital infrastructure in offering services to defied customers. When competitors learn of such a weakness, the business is likely to receive attacks that will hinder their indulgence bin the public services. Strikes will also damage confidentiality, reputation, integrity, and the entire infrastructure. It blocks the relationship between services and authority. To attain sustainable service delivery and a secured environment, Quality Web Design should move with speed to mitigate and raise fill in the security and policy of that exposes the company to threats.






















References

Beth Hendricks. (2017, December 13). Data security breach: 5 consequences for your business. Retrieved from https://www.theamegroup.com/security-breach/

Gertz, M., & Jajodia, S. (2017). Handbook of database security: Applications and trends. Springer Science & Business Media.

JOSIAH BUSSING. (2018, February 22). Ten Benefits of a website for a small business. Retrieved from https://mountaintopwebdesign.com/10-benefits-website-small-business/

Maurer, R. (2019, August 16). Top database security threats and how to mitigate them. Retrieved from https://www.shrm.org/resourcesandtools/hr-topics/risk-management/pages/top-database-security-threats.aspx