Respond to two colleagues (BELOW): (Half a page each and provide each reference separately)
Identify two types of vulnerabilities found in system design and explain the importance of embedding cybersecurity and quality control in the process. Explain your rationale.
Post from colleague 1
SQL injection is a great example of a system vulnerability. This is because it is directly related to the fundamental purposes of a system which is to perform a function. In this case SQL code is inserted into an input field on a website that references a data table within a database. The intention of the threat actor could be to obtain valuable information such as the login and password credentials of the users or just to be destructive. It is prevented with solid web application and database design. The user input should never directly be used by the application. The user input must be sanitized of items such as single quotes. Turning off visibility to database errors on production sites disables the threat actor’s ability to use SQL error messages to discover information about the database (What is SQL Injection, n.d.).
Another great example of a system vulnerability is buffer overflow. This occurs when the allotted space for a string of characters is greater than the allotted amount of memory can accommodate. This leads to overwriting program code with the threat actor’s own code, resulting in the compromising of the system. Patch and update application and web server products and use scanners to detect the vulnerability (Buffer Overflow, n.d.).
What is SQL Injection (SQLi) and How to Prevent It. (n.d). Retrieved from
Buffer Overflow. (n.d.). Retrieved from
Post from colleague 2
Two types of vulnerabilities found in system design are:
1. Programming errors: it is referred to as the software vulnerabilities that exists when applications or software have errors or bugs in them which could lead to control flow attacks, buffer overflows and memory management problems.
2. Weak access control or authentication.: A lot of devices make use of the default password, while there exist some devices with hard-coded passwords that provides backdoor access to those that have those hard-coded passwords. It is made easier for attackers to by-pass control mechanism.
Importance of embedding cybersecurity and quality control in the process
1. It assists an organization in the creation of an attack taxonomy which would be used in the classification and description of attacks any embedded system.
2. Cloud computing is vital to organization in harassing its capabilities with data analytics and anomalous.
3. There is also a need to work together and how to manage the threats and vulnerabilities.
4. It ensures maximum utilization of resources used in combating threats
5. It also creates a good and better atmosphere by increasing the morale of employees
6. Its responsible for making sure that the requirements, needs, expectations of the end-users and likewise are met.
Papp, D., Ma, Z., & Buttyan (2015). Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy. Thirteenth Annual Conference on Privacy, Security and Trust (PST). Retrieved from http://www.cse.psu.edu/~pdm12/cse597g-f15/readings/cse597g-embedded_systems.pdf
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we\'ll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.