StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Potential Liability on Cross-site Scripting - Essay Example

Cite this document
Summary
In the essay “Potential Liability on Cross-site Scripting” the author analyzes LIB’s Potential Liabilities, which appears to have in place a good, electronically managed system in their insurance brokering firm. They also have a team of management and staff…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Potential Liability on Cross-site Scripting
Read Text Preview

Extract of sample "Potential Liability on Cross-site Scripting"

Download file to see previous pages

The high-level management personalities of diverse disciplines, howsoever trustworthy, cannot digress from their own responsibilities to justifiably oversee such crucial and important functional branches as online security. The insurance industry has a solid customer base and vast financial inputs. Online security must be exclusively handled by security experts just like operations, program development and network operations are handled by experts in these fields. Otherwise, the industry could become an easy target of ceaseless and relentless attacks of malevolent hackers spread all over the globe.

The managers of the three disciplines meet only twice annually as the security management committee to co-ordinate security developments and plans. This step-motherly treatment to security could prove to be counterproductive and expensive in the long run. Other potential liabilities the company needs to address are risks arising from the high volume of online interactions and transactions with clients. When clients forget their username and/or password, they are required to answer a challenge question to retrieve the information by email.

If anyone can forget the username and/or password there is no guarantee they are likely to remember challenge questions and answers. Ideally, the company must provide clients with passwords. (Case Information)Recommendation on the immediate handling of the XSS threat to LIB The first and foremost action recommended is to employ a full-time security consultant and fix responsibilities inclusive of the XSS threat to LIB. The immediate next step is to make clients aware of the XSS risk and educate them on the course of action they need to bear in mind and act upon whenever browsing the LIB website.

The operations manager, program development manager, and network operations manager must continue to maintain vigilance in security matters and report unusual occurrences to the security department/consultant. These three management entities must coordinate with security daily or at least on a weekly basis. (The Cross-Site Scripting (XSS) FAQ)Recommendations on improvement in the management of security at LIBHaving a separate entity to handle online security issues at LIB is the ideal decision and the first step to address risks to the overall business.

The company can further improve its online security concerns by maintaining high alert on offline areas as well. A systematic reward scheme must be put in place for those providing information and alerts on unusual online movements. The company must also have its own discreet methods to test its security system by using tactics such as sting operations periodically in top secrecy. The company must also keep itself abreast of hackers' modus operandi and the susceptibilities and vulnerabilities of the online insurance industry.

As a standard measure, every company using online business systems and networks will ostensibly possess security technologies applicable to its sphere of operation and guard the interests of its clients and its own by routing online communications by encrypting, scrambling and decoding.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Potential Liability on Cross-site Scripting Essay, n.d.)
Potential Liability on Cross-site Scripting Essay. Retrieved from https://studentshare.org/management/1523881-potential-liability-on-cross-site-scripting
(Potential Liability on Cross-Site Scripting Essay)
Potential Liability on Cross-Site Scripting Essay. https://studentshare.org/management/1523881-potential-liability-on-cross-site-scripting.
“Potential Liability on Cross-Site Scripting Essay”. https://studentshare.org/management/1523881-potential-liability-on-cross-site-scripting.
  • Cited: 0 times

CHECK THESE SAMPLES OF Potential Liability on Cross-site Scripting

E-Commerce and E-Business

Gilmore PC 1 is one of the UK's home-grown online computer retailers catering industries from small to mid-size firms and from corporate to large enterprises.... Due to the exploitation of e-commerce or so called online shopping, it had an unfavourable effect with the firm which obliged them to do appropriate action to alleviate the problem of competition in the online market....
11 Pages (2750 words) Research Paper

Sports Training - Wingate and RSA Tests

Anaerobic power or capacity is an expression used for the maximal exercise up to a maximum of two minutes and the energy used during the workload is provided in large measure without necessitating oxygen, since the stored phosphagenes and glycogen in the muscles would be enough up to two minutes....
13 Pages (3250 words) Essay

A comparison of CORBA and Web Services

Distributed Applications refer to the applications which can be distributed across different processors and computer systems.... his concept helps in deploying an application across systems on a network which might be working a common project or an application.... hellip; Distribution introduces a whole new set of semantics for ease of computing; some applications by their very nature are distributed across multiple computers because of one or more of the following reasons (Chaffee & martin, 1999):There are some applications which might need to access common data Distributed Applications refer to the applications which can be distributed across different processors and computer systems....
16 Pages (4000 words) Essay

Dynamic Content Management

This literature review provides a broad overview of the technology known as web CMS.... It seeks to define the importance of the role of the end-user in the development of web CMS.... It looks at both Commercial off the Shelf software, as well as Open Source Software.... hellip; Much of the literature in this area is product centric produced by zealous marketing departments....
10 Pages (2500 words) Essay

Object-Oriented Modeling Issues

The CIO is a strategic decision maker for every information needs of the organization and makes sure that all penetrations for cost, effort and monetary optimization are performed at… The role of the CIO is to understand, identify, prioritize and implement the information needs and requirements for growth, better productivity and seamless integrations of required business units for better communication of information in an accurate and timely manner....
10 Pages (2500 words) Essay

Likely Threats in a Pharmacy and Their Control Measures

This literature review "Likely Threats in a Pharmacy and Their Control Measures" refers to using electronic means such as a remote computer to gain access to the unauthorized place.... The two forms of threats could lead to great damage to the business in terms of loss of assets.... hellip; Threats in information security have been a common issue for many past decades....
9 Pages (2250 words) Literature review

Supply Chain Management: Air Solutions

"Supply Chain Management: Air Solutions" paper uses the hypothetical case Air Solutions to analyze how such a company would locate its stores or warehouses; where it would obtain its supplies from; how the reliability of the company's products would affect supply operations of the same products.... nbsp; … The paper will also evaluate how to estimate demand for the company's various products in terms of part types....
8 Pages (2000 words) Term Paper

Web Application Security

… The paper "Web Application Security' is a perfect example of a term paper on information technology.... The SQL injection is one of the techniques used to attack a website and hence rendering it ineffective to the users.... This has a lot of negative impacts on the organizations as it leads to loss of information by the organization....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us