As a security architect, write a paper that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.
- What is the difference between software testing and website vulnerability and security assessments?
- How would you perform a website vulnerability and security assessment?
- How can you use planned attacks to identify vulnerabilities?
- How can you spot vulnerabilities in back-end systems and Structured Query Language (SQL) databases?
- How would you prepare a vulnerability and security assessment report?
Deliverables:
- Your paper should be 4-5 pages in length, not including the title and reference pages.
- You must include a minimum of (4) credible sources and information from the module to support your writing. The Saudi Digital Library is a good source for resources.
- Your paper must follow University academic writing standards and APA style guidelines, as appropriate.
- You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them.