Search for question
Question

1. Briefly describe two security risks associated with static site generation (SSG) architecture. 4 points 2. Briefly describe two security risks associated with progressive web applications (PWA). 4 points 3. Using the combined 3 phases of the Unified Kill Chain security model (i.e., In, Through, and Out), describe how an attacker could successfully exfiltrate confidential data from a secure database via a web application. Clearly label each phase and explicitly describe the attacker's actions. Note: No credit will be given for mere regurgitation of the steps from the security model (e.g., the attacker will engage in reconnaissance). 6 points 4. As discussed in class, input sanitization and validation can be used to mitigate web application attacks. Briefly describe the difference between input sanitization and input validation. 2 points 5. How can an attacker obtain a valid session identifier to launch a session fixation attack? Limit your answer to one way an attacker could accomplish the above. 2 points./n

Fig: 1

Fig: 2