Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material Index separation of duties and Numbers responsibilities, 626 3DES (Triple DES), 177, 220, 222–223 CIA Triad and, 581–582 802.1X/EAP, 478 compensating control, 583 802.11 standard, 473 corrective control, 583 DAC (Discretionary Access Control), 628, 629 A defense-in-depth, 627–628 detective control, 582–583 AAA services, 8, 11 deterrent control, 583 AACS (Advanced Access Content System), directive control, 583 260 logical control, 584 abstraction, 13, 43 nondiscretionary, 630–635 acceptable use policies, 28 ABAC (Attribute Based Access access abuses, 410–411 Control), 629 access control Attribute Based, 633 administrative control, 583–584 MAC (Mandatory Access Control), assets, 580–581 629, 633–635 attacks, 635–636 RBAC (Role Based Access Control), access aggregation, 641 628, 630–632 asset identification, 637–638 rule-based access control, 628, 632 password attacks, 641–648 permissions, 624 risk elements, 636 physical control, 584 smartcard attacks, 651–652 preventive control, 582 social engineering attacks, privilege creep, 631 649–651 privileges, 625 spoofing attacks, 648 protection methods threat identification, 638–640 account lockout, 653 vulnerability analysis, 640 electronic access, 652 authorization logon notification, 653 access control matrix,COPYRIGHTED 625 MATERIAL multifactor authentication, 652–653 ACL, 625 password hashing, 652 capability tables, 625 password masking, 652 constrained interface, 625–626 password policies, 652 content-dependent control, 626 password salting, 652 context-dependent control, 626 physical access, 652 implicit deny, 625 user education, 653 need to know, 626 recovery control, 583 principle of lease privilege, 626 review question answers, 971–973 bindex.indd 06/27/2018 Page 1001 1002 access control matrix – Application layer (OSI) rights, 624–625 advisory policies, 27 security policies, 626–627 adware, 928 steps, 582 AES (Advanced Encryption Standard), 220, technical control, 584 224–225 written lab answers, 996 agents, 565 access control matrix, 286–288, 625 aggregation, 700 access points, 473–475 Agile development approach, 884–885 ad hoc mode, 475 ALE (annualized loss expectancy), 70–71, 110 enterprise extended mode, 475 algorithms ESSID, 475 asymmetric key, 216–219 infrastructure mode, 475 hashing algorithms, 219 rogue access points, 484–485 memorization chart, 246 SSID, 475 key spaces, 201 stand-alone mode, 475 alternate processing sites, 820–821 wired extension mode, 475 cloud computing, 824 access review audits, 785 cold sites, 821–822 account lockout, 653 hot sites, 822–823 account management reviews, 689 mobile sites, 823–824 accountability, 11, 43 service bureaus, 824 AAA services, 8 warm sites, 823 authorization and, 586–587 analytic attacks, 265 accreditation, 306–307 AND operation, 202–203 CNSS (Committee on National Security antivirus Systems), 308 heuristic-based detection, 921 DIACAP (DoD Information Assurance Kaspersky Lab, 920–921 Certification and Accreditation signature-based detection, 921 Process), 308 Tripwire, 922 DITSCAP (Defense Information APIPA (Automatic Private IP Addressing), Technology Security Certification 552–553 and Accreditation Process), 308 application attacks NIACAP (National Information back doors, 934–935 Assurance Certification and buffer overflows, 933–934 Accreditation Process), 308 escalation of privilege, 935 RMF (Risk Management Framework), rootkits, 935 308 TOCTTOU, 934 ACL (access control lists), 625 written lab answers, 1000 active website monitoring, 687 Application layer (OSI) ADEPT (Adobe Digital Experience EDI (Electronic Data Interchange), 451 Protection Technology), 261 FTP (File Transfer Protocol), 451 Adleman, Leonard, 239 HTTP (Hypertext Transfer Protocol), 451 administrative access control, 583–584 IMAP (Internet Message Access administrative controls, 78–79 Protocol), 451 physical, 403 LPD (Line Print Daemon), 451 administrative investigations, 846–847 NNTP (Network News Transport administrative law, 128–129 Protocol), 451 bindex.indd 06/27/2018 Page 1002 Application (Process) layer (TCP/IP model) – assurance 1003 POP3 (Post Office Protocol version 3), 451 cloud-based, 713–714 SET (Secure Electronic Transaction), 451 data classification, 162 SMTP (Simple Mail Transfer Protocol), confidential, 162, 164 451 defining, 165 SNMP (Simple Network Management FOIA (Freedom of Information Act), 163 Protocol), 451 FOUO (for official use only), 163 S-RPC (Secure Remote Procedure Call), 451 private, 164 Telnet, 451 proprietary, 164 TFTP (Trivial File Transfer Protocol), 451 public, 165 Application (Process) layer (TCP/IP model) SBU (sensitive but unclassified), 163 DHCP (Dynamic Host Configuration secret, 162 Protocol), 462 sensitive, 164 FTP (File Transfer Protocol), 462 top secret, 162 HTTP (Hypertext Transport Protocol), unclassified, 163 462 data security controls, 165–167 IMAP (Internet Message Access devices, 580 Protocol), 462 facilities, 580 LPD (Line Print Daemon), 463 files, 581 NFS (Network File System), 463 hardware inventories, 710–711 POP3 (Post Office Protocol), 462 information, 580 SMTP (Simple Mail Transfer Protocol), media management, 714–715 462 flash drives, 715 SNMP (Simple Network Management lifecycle, 717 Protocol), 463 mobile devices, 716–717 SSL (Secure Sockets Layer), 462 tape media, 716 Telnet, 462 objects, 581 TFTP (Trivial File Transfer Protocol), 462 owners, 179–180 X Window, 463 personnel, 580 application logs, 774 PHI (protected health information), 161 application-level gateway firewalls, 489 physical assets, 711–712 APTs (advanced persistent threats), 705, 858, PII (personally identifiable information), 917 160–161 architecture, 320–321 proprietary data, 161–162 distributed, 351 retaining, 175–176 review question answers, 966–967 review question answers, 956–958 written lab answers, 994–995 sensitive ARO (annualized rate of occurrence), 70, 109 handling, 170–171 ARP (Address Resolution Protocol), 445, marking, 169–170 446–447, 461–462, 567–568 software, licensing, 711 artificial identifiers, 183 subjects, 581 ASCII (American Standard Code for systems, 580 Information Interchange), 450 valuation, 65 asset-focused threats, 31 virtual assets,712 assets, 64 written lab answers, 991 access control, 580 assurance, 281 bindex.indd 06/27/2018 Page 1003 1004 asymmetric cryptography – attacks asymmetric cryptography incremental, 387–388 El Gamal, 241 input checking, 386–387 elliptic curve, 242 maintenance hooks and, 387 key length, 240–241 parameter checking, 386–387 Merkle-Hellman Knapsack, 240–241 privileged programs, 387 private keys, 238–239 salami attack, 388 public keys, 238–239 state attacks, 389 RSA algorithm, 239–241 trusted recovery and, 386 asymmetric cryptosystems, 199 computer crime asymmetric key algorithms, 216–219 APTs, 858 key management, 253–254 business, 858 asynchronous dynamic password tokens, 593 corporate espionage, 858 ATO (authorization to operate), 63 financial, 859 attacker-focused threats, 31 grudge, 859–861 attacks, 66, 635–636. See also malicious hacktivists, 861 code industrial espionage, 858 access aggregation, 641 insider threats, 860 access control, 635–636 intelligence, 857–858 access aggregation, 641 military, 857–858 asset identification, 637–638 script kiddies, 861, 916–917 password attacks, 641–648 terrorist, 859 risk elements, 636 thrill, 861 smartcard attacks, 651–652 cryptography social engineering attacks, 649–651 analytic, 265 spoofing attacks, 648 birthday, 267–268 threat identification, 638–640 brute force, 265–266 vulnerability analysis, 640 chosen ciphertext, 267 agents, 565 chosen plaintext, 267 application attacks ciphertext only, 266–267 back doors, 934–935 collision attack, 267–268 buffer overflows, 933–934 frequency, 266–267 escalation of privilege, 935 implementation, 265 rootkits, 935 known plaintext, 267 TOCTTOU, 934 man in the middle, 267 APTs (advanced persistent threats), 858 meet in the middle, 267 ARP (Address Resolution Protocol), replay, 268 567–568 reverse hash matching attack, 267–268 asset identification, 637–638 statistical, 265 botnets, 565, 747–748 DDoS (distributed denial of service), bots, 565 564–565 business, 858 DNS poisoning, 568 computer architecture DNS spoofing, 568 buffer overflow, 386–387 DoS (denial of service), 564–565, data diddling, 387–388 748–749 design-based attacks, 385–388 eavesdropping, 565–566 bindex.indd 06/27/2018 Page 1004 auditing – auditing 1005 espionage, 755–756 terrorist, 859 financial, 859 threat identification fraggle attacks, 751 APTs, 639–640 grudge, 859–861 thread modeling, 638–639 hijacking, 568 thread modeling approaches, 640 hyperlink spoofing, 568–569 thrill, 861 impersonation, 566–567 unskilled attackers, 457 insider threats, 860 VoIP (Voice over Internet Protocol), 525 intelligence, 857–858 vulnerability analysis, 640 land attacks, 752 wireless networking, 482–483 malicious code, 753–754 evil twins, 485 drive-by downloads, 753 IV (initialization vector), 484 man-in-the-middle, 754–755 replay attacks, 484 masquerading, 566–567 rogue access points, 484–485 military, 857–858 war chalking, 483 modification attacks, 567 war driving, 483 password attacks, 641–643 written lab answers, 995 birthday attacks, 645–646 zero-day exploits, 752–753, 928 brute-force attacks, 644–645 zombies, 565 dictionary attacks, 643 auditing, 42, 783 PBKDFw, 646 AAA services, 8, 10–11 pepper, 647 access review audits, 785 rainbow table attacks, 646 auditors, 784 sniffer attacks, 647 change management, 788 wireshark capture, 647–648 COBIT (Control Objectives for phishing, 569 Information and related ping floods, 751 Technologies),
Recommended publications
  • Abstract Keywords
    Global Journal of Enterprise Information System January -June 2012 Volume-4 Issue-I ABSTRACT Website monitoring is the process of testing and verifying that end-users can interact with a website or web application .Website monitoring is often used by business to ensure that their sites are live and responding. Website MMMonitoringMonitoringonitoring:: Contemporary way to test and verify RajBala Simon KEYWORD S AIIT, Amity University.Noida, India [email protected] Web Monitoring Verify Laxmi Ahuja Test URL AIIT, Amity University. Noida, India [email protected] Theme Based Paper Website Monitoring: Contemporary way to test and verify Page 29 Global Journal of Enterprise Information System January -June 2012 Volume-4 Issue-I page load time of that page is more than 5 seconds, you should be notified through e-mail/SMS/RSS. INTRODUCTION This helps you in taking quick action before it affects Website monitoring is the process of testing and end users. verifying that end-users can interact with a website or web application .Website monitoring is often used by business to ensure that their sites are live and A perfect monitoring provides daily/weekly responding. performance reports through email to know your site’s performance on a daily/weekly basis. Website owner can also view time –based response time The most important online face of your organization reports form ‘Reports’ tab that give them a fair idea is your website. So what damage is caused to your of the performance of their websites over a period of brand and sales when your website is unavailable? time. If they noticed a constant degradation of It may be that your customers cannot perform online performance, then they can take necessary actions transactions and go to your competitors instead.
    [Show full text]
  • Prtg Network Monitor
    PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG ... proven in more than 150,000 installations worldwide. Network Monitor Easy, failsafe, and complete is ... control over your network. ... ONE SOFTWARE SOLUTION TO MONITOR YOUR ENTIRE NETWORK, INCLUDING DEVICES, APPLICATIONS, ... A SCALABLE ENTERPRISE NETWORK MONITORING? TRAFFIC, AND AVAILABILITY. MONITORING SOLUTION. Network monitoring continuously collects current status information PRTG Network Monitor moni- The PRTG Network Monitor from your IT network to determine the availability and utilization of tors Windows, Linux, Unix, and Enterprise Console supports devices and to measure bandwidth usage. The IT administrator is Mac OS systems. The solution viewing data of multiple PRTG informed immediately via email, text message, or other means if de- supports SNMP, WMI, Flow moni- installations at a glance: It dis- lays, malfunctions, or even failures are recorded. Historically collected toring, as well as packet sniffing, plays aggregate information for all data gives a long-term overview of the overall health and usage of the and monitoring of IPv6 devices. PRTG installations in one single network. program, even in huge setup It offers about 200 pre-built sen- scenarios. Systematic network monitoring helps prevent outages, optimize net- sors specifically designed for QoS works, and improve services: Save time and money! monitoring, website monitoring, This is ideal for enterprises that email monitoring, application need to scale a large number of monitoring, database monitoring, sensors. monitoring of virtual environ- ments, and much more. EASY TO USE WEB INTERFACE The ‘sunburst view‘ shows the status of the whole network on a single screen.
    [Show full text]
  • File Transfer Protocol Mini Project
    File Transfer Protocol Mini Project Zacherie feminize alfresco while outstretched Ernesto vesicates haggishly or scrumps barbarously. Sudanese existingand repand and Shaunresolvable always Eugene monopolises overtired authentically quite hereditarily and burble but devolves his metamorphism. her concubine Wanier perchance. Aloysius still inflict: Tanum earth station in an application can you are usually intended for usability reasons, file transfer protocol mini project for all of this section: page of understanding and! Normally goes beyond make have access to view general status codes should be an existing files with dynamicallygenerated html pages can open. Fully correspond to provide control of the solution. Later development on the use the task depends on the functionality of data nodes exchange of os, or personal emails and. This command lines are not likely a byte size and conduct file. Some systems consortium, the file transfers are just simple way that file transfer protocol mini project is open source system, copy of these funs have. The discussion of data transfer of new file management programs communicating data applications do not have record keys: a program written as a basic client. It should be transferred to server is distributed between people who need a series of. Should not have a number of the other flags in web server able to. The build artifacts and demands resources for file transfer protocol mini project. Api management and hides its contents from duplicate files easily implemented in implementations without copying files. The service and its host computers would send requests as file transfer protocol mini project. The desktop widgetsis also required available to a look at marginal cost of data between computers often an experiment in mobile devices, etc by default.
    [Show full text]
  • Monitoring Business Critical Web Applications - Need for an Effective Strategy
    Site24X7.com Monitoring business critical web applications - Need for an effective strategy White Paper from Site24x7.com Web: www.site24x7.com Table of Contents 1. Executive Summary 2. Overview 3. The Challenge 4. The Solution 5. Site24x7 Web Application Monitoring 6. How Site24x7 meets the challenges? 7. Advantages 8. Conclusion Executive Summary The number of companies using internet as their business platform has increased at an exponential rate in the past decade. Business critical web applications need to be monitored in an objective manner to ensure optimal performance. This paper discusses the challenges faced by busi- nesses in monitoring the performance of their web applications, the need for an effective web application monitoring strategy and the Web Ap- plication Monitoring feature of Site24x7. Web Application Monitor 2 Overview E-Commerce has moved beyond its original conception of a cost-saving tool and is now a standard business tool used widely for creating business opportunities. Industry has shown that many new markets for intangible products are being created around changing patterns of how people work and spend their leisure time. This allows consumers to access services such as buying discount coupons, best buy sales, banking, insurance and travel reservations directly from their homes and businesses. E-commerce is being widely used to develop world wide customers in media, entertainment and communication sectors. Banking, online trading and online money transfer services are some of the businesses that use inter- net for high value transactions. What is the core that ensures the success of a web-based business? The answer is obvious; fast loading and fully functional web applications that can be accessed anywhere around the world, 24x7.
    [Show full text]
  • Identifying Javascript Skimmers on High-Value Websites
    Imperial College of Science, Technology and Medicine Department of Computing CO401 - Individual Project MEng Identifying JavaScript Skimmers on High-Value Websites Author: Supervisor: Thomas Bower Dr. Sergio Maffeis Second marker: Dr. Soteris Demetriou June 17, 2019 Identifying JavaScript Skimmers on High-Value Websites Thomas Bower Abstract JavaScript Skimmers are a new type of malware which operate by adding a small piece of code onto a legitimate website in order to exfiltrate private information such as credit card numbers to an attackers server, while also submitting the details to the legitimate site. They are impossible to detect just by looking at the web page since they operate entirely in the background of the normal page operation and display no obvious indicators to their presence. Skimmers entered the public eye in 2018 after a series of high-profile attacks on major retailers including British Airways, Newegg, and Ticketmaster, claiming the credit card details of hundreds of thousands of victims between them. To date, there has been little-to-no work towards preventing websites becoming infected with skimmers, and even less so for protecting consumers. In this document, we propose a novel and effective solution for protecting users from skimming attacks by blocking attempts to contact an attackers server with sensitive information, in the form of a Google Chrome web extension. Our extension takes a two-pronged approach, analysing both the dynamic behaviour of the script such as outgoing requests, as well as static analysis by way of a number of heuristic techniques on scripts loaded onto the page which may be indicative of a skimmer.
    [Show full text]
  • Website Performance Monitoring Best Practices, Kpis and Tools
    WHITE PAPER • JUNE 2018 Website Performance Monitoring Best Practices, KPIs and Tools A guide to achieving effective website performance monitoring. 2 • WHITE PAPER • WEBSITE PERFORMANCE MONITORING BEST PRACTICES, KPIs AND TOOLS ca.com Executive Summary Challenge Today, simply having a website for your business is not enough. To attract and keep customers, you need one that delivers an excellent user experience. Achieving this goal can be challenging. In addition to demanding well-designed, intuitive websites, modern users set an exceedingly high bar for site performance. A number of shortcomings might cause a site to fail to meet those expectations. Many users will abandon a page that fails to load within three seconds, for example, and a one-second delay in page load time results in 11 percent fewer page views. Also notable is the fact that users form a lasting impression of a website within just the first 50 milliseconds of a visit. In addition, search engines punish slow-loading websites with lower rankings, which makes it more difficult for new customers to find your business. (For more on these statistics and other user expectation data, see CA’s Infographic “Is Your Website Stacking Up to Customer Expectations?”) Opportunity Indeed, a poorly performing website will quickly undercut the investment a business makes in creating the site and setting up infrastructure to host it. Even the best-designed website will fail to please users if it loads slowly, throws errors or is intermittently unavailable. And world-class website hosting infrastructure will deliver little business value if software performance problems cause page load delays or other performance issues.
    [Show full text]
  • NCUA Letter 02-CU-17
    NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: December 2002 LETTER NO.: 02-CU-17 TO: All Federally-Insured Credit Unions SUBJ: e-Commerce Guide for Credit Unions ENCL: e-Commerce Guide for Credit Unions The purpose of this letter is to provide NCUA’s e-Commerce Guide for Credit Unions. The guide offers information to assist credit unions engaging in, or considering, e-Commerce activities (electronic delivery of financial services via the Internet). Credit unions can use this information as a guide to aid in the planning, contracting, delivery, and support of e-Commerce activities. Offering e-Commerce services may provide benefits to credit unions and their members. However, the use of the Internet can also increase the amount of risk to the credit union. The enclosed guide focuses on processes to assist credit unions in managing the risks related to e-Commerce. If you have any questions, please contact your NCUA Regional Office or State Supervisory Authority. Sincerely, /S/ Dennis Dollar Chairman e-Commerce Guide For Credit Unions NCUA 8072 November 2002 Table of Contents 1. INTRODUCTION.................................................................................................................. 1 2. THE CONVERGENCE OF CREDIT UNIONS AND THE INTERNET ........................ 2 3. SMALL CREDIT UNIONS .................................................................................................. 3 4. OVERSIGHT ........................................................................................................................
    [Show full text]
  • The Value of Measuring End-User Experience from a Global Point of Presence
    www.site24x7.com Web Application Monitoring Service The Value of Measuring End-User Experience from a Global Point of Presence White Paper from Web: www.site24x7.com www.Site24x7.com Email: [email protected] Table of Contents 1. Introduction 2. The Business need for Web Application Monitoring 3. Different Approaches: Monitoring from Inside and Outside of the Corporate Firewall 4. Monitoring Web Applications across the Entire Delivery Chain 1. Third-party services 2. Composite applications 3. User-generated content 5. Capabilities Needed 1. Tools for active (synthetic) monitoring of application performance 2. Tools for monitoring application performance across application delivery chain 3. Tools for defining dynamic thresholds for performance of Web applications 4. Tools for issuing alerts when performance falls below pre-defined thresholds 5. Tools for comparing application performance to Service Level Agreements (SLA) 5. Recommendations for Action 6. Capabilities of Site24x7 Website Monitoring Service www.site24x7.com 2 Introduction Organizations are increasingly depending on the web to communicate with their customers, prospects, and partners. As organizations expand their target markets to different geographies, they are seeking to ensure that they have visibility into the quality of the end-user experience for their web applications regardless of the business users’ geographic location. Many of these applications are being used as revenue generating tools for these organizations, and they need to understand not only how these applications are performing from the perspective of their IT departments, but also how they are performing from the perspective of business users. The main characteristics of new web services are increased amount of dynamic and user generated content, changes in usage patterns, and a proliferation of composite applications and third-party services.
    [Show full text]
  • 3000 Applications
    Uila Supported Applications and Protocols updated March 2021 Application Protocol Name Description 01net.com 05001net plus website, is a Japanese a French embedded high-tech smartphonenews site. application dedicated to audio- 050 plus conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also classifies 10086.cn the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese cloudweb portal storing operated system byof theYLMF 115 Computer website. TechnologyIt is operated Co. by YLMF Computer 115.com Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr ThisKorean protocol shopping plug-in website classifies 11st. the It ishttp operated traffic toby the SK hostPlanet 123people.com. Co. 123people.com Deprecated. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt ChineseLithuanian web news portal portal 163. It is operated by NetEase, a company which pioneered the 163.com development of Internet in China. 17173.com Website distributing Chinese games. 17u.com 20Chinese minutes online is a travelfree, daily booking newspaper website. available in France, Spain and Switzerland. 20minutes This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Checkout (acquired by Verifone) provides global e-commerce, online payments 2Checkout and subscription billing solutions.
    [Show full text]
  • 2020 Network Monitoring Buyer's Guide
    2020 NETWORK MONITORING BUYER’S GUIDE 1 NETWORK MONITORING BUYER’S GUIDE MARKET OVERVIEW The network is perhaps the most essential technology of the modern business. For just about every company, networks are the core technology that allows it to operate efficiently, promote collaboration amongst its staff, and communicate with clients. As such, companies need to ensure that their network is running smoothly at all times. That’s why continuously observing your network for performance problems is a critical aspect of maintaining a business network. Businesses rely on their network to perform at certain levels to satisfy the demands of executives and clients. Unfortunately, network performance issues are all too common, and they can put a strain on your company. Your company needs to be prepared to deal with an unexpected performance problem and fix it before it causes too much stress. Performance issues and network outages are not just infuriating to deal with; they can also be incredibly costly to your company. NetRounds’ September 2019 report The Hidden Cost of Network Brownouts revealed that companies lose $600,000 a year on average due to network performance problems. The survey also showed that network brownouts (or sudden drops in quality) are causing damage to 83% of large companies, with many employees citing frustration with the dips in network performance. How can a business deal with network performance problems, though? Enterprise networks are constantly growing in complexity, adding new devices and new kinds of hardware as Internet of Things (IoT) deployments become more popular. It’s also difficult to predict what performance issues are likely to happen (and where they’re coming from) until it’s too late.
    [Show full text]
  • Website Monitoring for Webmasters White Paper from Manageengine
    Website Monitoring For Webmasters White Paper from ManageEngine Web: www.manageengine.com/apm email: [email protected] Introduction Any Webmaster knows how irritating it feels to be notified at 2 AM that their website is not accessible. Home pages being too slow or irate users who are unable to complete their web transactions are detrimental to business. What Webmasters need are tools that help them moni- tor critical parameters of their websites and help ease their day-to-day activities. In this paper you can find out what you need to look for in a website monitoring tool. 6 critical aspects of a website that need to be monitored Web Page Availability The basic need for every Webmaster is to ensure that their website is up and running. Downtimes could result in lost customers and eventually lost revenues. Webmasters need tools that will alert them in real time when their websites are down. The ability to check for the presence of specific keywords in web pages would also add to their comfort level. Web Page Response Time Slow web pages tend to drive users to your competitors. As far as many are concerned, their Internet experience is the ‘world wide wait’. Therefore if your website is not responsive enough, you are going to lose potential customers. With Web 2.0 web applications driving the next wave of user expectations, in terms of web page responsiveness, website administrators cannot compromise with slow web pages SMS Email Reports Repsonse Time Execute Web Transactions Website Availability Web Page Correctness Are your pages rendered completely? You need to monitor whether your web pages show the full content.
    [Show full text]
  • Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures
    computers Article Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures Xuan Dau Hoang * and Ngoc Tuong Nguyen Posts and Telecommunications Institute of Technology, Hanoi 100000, Vietnam; [email protected] * Correspondence: [email protected]; Tel.: +84-904-534-390 Received: 23 February 2019; Accepted: 7 May 2019; Published: 8 May 2019 Abstract: Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate interruption of website operations and damage of the owner reputation, which may result in huge financial losses. Many solutions have been researched and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, diff comparison, DOM tree analysis, and complicated algorithms. However, some solutions only work on static websites and others demand extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the machine learning-based detection and the signature-based detection. The machine learning-based detection first constructs a detection profile using training data of both normal and defaced web pages. Then, it uses the profile to classify monitored web pages into either normal or attacked. The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On the other hand, the signature-based detection is used to boost the model’s processing performance for common types of defacements. Extensive experiments show that our model produces an overall accuracy of more than 99.26% and a false positive rate of about 0.27%.
    [Show full text]