Part A) Give one good example of a covert storage channel. Explain how the covert storage channel you described can be mitigated or prevented. Part B) Give one good example of a covert timing channel. Explain how the covert timing channel you described can be mitigated or prevented (Part A and Part B should be at least ALMOST A PAGE LONG) Part 1) Choose your own topic related to web technologies/applications, you consider important and describe the topic in detail. Do not select any security related topic. Below is a list of sample topics you may choose: HTTP protocol (HTTP requests/responses/methods, HTTP headers, Cookies, status codes, difference between HTML and HTTP) Client-side technologies (e.g., JavaScript, HTML or …) Server-side technologies (e.g., PHP, Java platform or …). Many more. Part 2) Conduct research on web security vulnerabilities. Select one vulnerability, you consider important, and describe it in detail. Explain how the vulnerability you described can be overcome or prevented. In addition, briefly explain why you chose the vulnerability. (should be at least ALMOST A PAGE LONG)
Get Free Quote!
311 Experts Online