What is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities?

Majority of Web Application Attacks

  • SQL Injection
  • XSS (Cross Site Scripting)
  • Remote Command Execution
  • Path Traversal

Attack Results

  • Access to restricted content
  • Compromised user accounts
  • Installation of malicious code
  • Lost sales revenue
  • Loss of trust with customers
  • Damaged brand reputation
  • And much more

A Web application in today’s environment can be affected by a wide range of issues. The diagram above demonstrates several of the top attacks used by attackers, which can result in serious damage to an individual application or the overall organization. Knowing the different attacks that make an application vulnerable, in addition to the potential outcomes of an attack, allow your firm to preemptively address the vulnerabilities and accurately test for them.

By identifying the root cause of the vulnerabilities, mitigating controls can be implemented during the early stages of the SDLC to prevent any issues. Additionally, knowledge of how these attacks work can be leveraged to target known points of interest during a Web application security test.

Recognizing the impact of an attack is also key to managing your firm’s risk, as the effects of a successful attack can be used to gauge the vulnerability’s total severity. If issues are identified during a security test, defining their severity allows your firm to efficiently prioritize the remediation efforts. Start with critical severity issues and work towards lower impact issues to minimize risk to your firm.

Prior to an issue being identified, evaluating the potential impact against each application within your firm’s application library can facilitate the prioritization of application security testing. With an established list of high profile applications, wenb security testing can be scheduled to target your firm’s critical applications first with more targeted testing to lower the risk against the business.


  • Q145:

    The most common type of license included with software purchased by individual users is a(n) ____________________.

  • Q146:

    A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

  • Q147:

    A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

  • Q148:

    Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

  • Q149:

    A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

  • Q151:

    A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

  • Q152:

    To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

  • Q153:

    A(n) ____________________ agreement is the right to use software.

  • Q154:

    The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

  • Q155:

    The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

Is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster?

A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.

Is a program that hides in a computer and allows someone?

CH5 Cyber Security Vocab.

What happens when people steal personal?

Key Takeaways. Identity theft occurs when someone steals your personal information and credentials to commit fraud. There are various forms of identity theft, but the most common is financial.