Assignment: Computer and Information Security
Item Vulnerability computer Threat Measure The asset
system classes protection affected
1 Bug Disruption Operational Software
2 Weak password Deception Technical Human
3 Software that is already Disruption Operational Data and
infected with virus Software
4 Missing data encryption Disclosure Technical Data
5 OS command injection Deception Operational Communication
link
7 SQL Injection Disclosure Technical Data
8 Buffer overflow Disruption Operational Software
9 Missing authorization Disclosure Technical Data
10 Use of broken algorithms Disclosure Technical Data
11 URL redirection to untrusted Deception Operational Communication
sites link
12 Path traversal Disclosure Operational Data
13 Missing authentication for Disclosure Technical Software
critical function
14 Unrestricted upload of Disruption Operational Software
dangerous file types
15 Dependence on untrusted Deception Managerial Data and
inputs in a security decision software
16 Cross-site scripting and Deception Operational Data
forgery
17 Download of codes without Deception Operational Software
integrity checks
18 Deception Managerial Human
Phishing Scams
19 Unsecure device Disclosure Managerial Human
20 Adware Disruption Operational Communication
links
1. A bug is an unexpected problem with software or hardware. Typical problems are often the
result of external interference with the program's performance that was not anticipated by the
developer. Minor bugs can cause small problems like frozen screens or unexplained error
messages that do not significantly affect usage.
2. OS Command injection is an attack in which the goal is execution of arbitrary commands on
the host operating system via a vulnerable application. Command injection attacks are possible
when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a
system shell.
3. SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code
for backend database manipulation to access information that was not intended to be displayed.
This information may include any number of items, including sensitive company data, user lists
or private customer details.
4. Buffer overflow Also known as a buffer overrun, buffer overflow occurs when the amount of
data in the buffer exceeds its storage capacity. That extra data overflows into adjacent memory
locations and corrupts or overwrites the data in those locations.
5. Use of broken algorithms Using broken or weak cryptographic algorithms can leave data
vulnerable to being decrypted. Many cryptographic algorithms provided by cryptography
libraries are known to be weak, or flawed. Using such an algorithm means that an attacker may
be able to easily decrypt the encrypted data.
6. URL redirection to untrusted sites. An http parameter may contain a URL value and could
cause the web application to redirect the request to the specified URL. By modifying the URL
value to a malicious site, an attacker may successfully launch a phishing scam and steal user
credentials.
7. Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to
read arbitrary files on the server that is running an application. This might include: Application
code and data.
8. Missing authentication for critical function When authentication checks are not applied,
users are able to access data or perform actions that they should not be allowed to access or
perform.
9. Restricted upload of dangerous file types file High Insufficiently restricted file uploads can
allow a file to be uploaded that runs malicious code. For example, a website that doesn't check
the file extension of an image can be exploited by uploading a script with an extension, such as .
php or
10. Cross-site scripting and forgery Let us consider the following example: Alice wishes to
transfer $100 to Bob using the bank.com web application that is vulnerable to CSRF. Maria, an
attacker, wants to trick Alice into sending the money to Maria instead. The attack will comprise
the following steps: Building an exploit URL or script.
11. Download of codes without integrity checks The product downloads source code or an
executable from a remote location and executes the code without sufficiently verifying the origin
and integrity of the code.
12. Phishing scams are one of the most common types of human security risks. They involve
attackers sending emails or messages that appear to be from legitimate sources to trick users into
divulging sensitive information or clicking on malicious links.
13. Unsecured devices, such as laptops or smartphones that are left unattended or unprotected
can also pose a significant human security risk. Attackers can gain access to sensitive
information by physically accessing these devices.
14. Adware is a type of malware or unwanted software designed to deliver targeted
advertisements on infected computers. Adware can serve ad pages and collect information about
users to target them better with customized ads.