Security Metrics the Intent of Case Study

Total Length: 718 words ( 2 double-spaced pages)

Total Sources: 1+

Page 1 of 2



(%) Cross Site Scripting (XSS) errors -- by far the most common strategy hackers use to gain access to the source code of websites and the databases supporting them is to use a technique called cross-site scripting (Brodkin, 2007). Actively monitoring the percentage of XSS errors over time can determine patterns of when hackers attempt to gain access to a website's source code, database links, pricing and e-commerce systems. This is one of the most often used metrics in security dashboards used for monitoring Web-based applications and multisite installations.

(%) Incidence and Trending of Buffer Overflow Injection Flaws -- This is most commonly associated with attempts to gain access to SQL databases supporting a website by forcing a buffer overflow condition (Brodkin, 2007). This is one of the most effective hacking strategies there are as it forces a system to fail and allow access.

(%) Authentication Soft and Hard Errors -- the most ubiquitous of metrics, this measures how many times passwords work or fail, and how their reset trending indicates that an automated set of code or a bot is attempting to gain literally hundreds of passwords for a system simultaneously (Brodkin, 2007).


(%) Service Level Agreement (SLA) hard security faults on system performance -- All services companies who offering hosting offer a Service Level Agreement which stipulates the minimal level of performance they will deliver as part of their hosting services. This metric, % of SLA hard security faults tells the percentage of time a given hard fault was encountered to the configuration management system for the website or complex or servers. A hard fault would be an attempt to either use XML or FTP to gain cross-channel access to servers and disrupt the site or bring it down. This is a technique used in more advanced Ddos attacks, which is specifically aimed at bringing down an entire site configuration......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Metrics The Intent Of" (2009, August 08) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/security-metrics-intent-20044

Latest MLA Format (8th edition)

Copy Reference
"Security Metrics The Intent Of" 08 August 2009. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/security-metrics-intent-20044>

Latest Chicago Format (16th edition)

Copy Reference
"Security Metrics The Intent Of", 08 August 2009, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/security-metrics-intent-20044