Free case study about web application server attacks


The rising global war on fight against cybercrime terrorism has raised a sound alarm of danger to its subscribers and users. However, particularly to the US government attempt to solving the problem has been a tooth and nail fight where the concerned agencies depicts quite a big challenge by delaying the response migrating to the domain name system security extension concerns.
It is in this regard that most identified potential risks on malicious attacks to this websites have not been addressed in a vast manner to ending the menace but rather procrastinating it. Non adherence to the state’s set policies and regulation remains to be the main attributable potential cause. The following are identified potential risks, suggested mechanisms to combat the domain name system security extension concerns towards attaining a secure as well as safe means to having government websites, (Stuttard & Pinto, 2011).
According to the recent research studies on website securities and web information hacking, transition of website management from decentralized to a centralized form through adapting the US federal agencies standards has been a goal to go. However, while the implementation rate remains to be slow, implementing these policies on shift from individual websites to a centralized domain has not actively been enacted in order to solve the problems as per the expectation of national information technology systems, (Cross, 2007).
This delay has hence created a to go loophole for the internet hackers hence conducting their malicious investigating studies to hijack the information making it not safe not only to the individuals but also to the public. Suggestion by the government that all the federal agencies to offer support to the domain name system security extension concerns clearly indicates a need to have the plans implemented and enforced.
This is then believed to bring a sense of implicit adherence with conformance to the given corporate standards other than having the whole exercise and option. As a matter of fact the implementation of the public law 107-347 by the National institute of standards and Technology 2002 is evident not to have effectively met its expected targets of one hundred percent adherence by al federal agencies as by the end of the year 2009 but surprisingly only 40 percent of its target had met the requirements, (Shema, 2010). Enforcing the law to punish those who are unable or rather unwilling to bid all the deadlines by giving them an equivalent punishment can be better means to improving the rate of adherence.
Clear definition of what role and who need to play within the sect and by what time marks a better means to creating a responsibility. Research indicates that it is believed by many if not all agencies that sole role of the government is to maintain the normal functioning of the organization as well as maintaining its security, (Stuttard & Pinto, 2011).
Introducing a public mentoring lecture to the federal agencies with a clearly defined subject to actively involve them participate in the centralization of the information control will improve the progress towards achieving the goals. This will do away with assumptions and bring about an active sense of project ownership that will incline the action towards working to the set targets and standards. This means that current downfall is attributable to the sluggishness by the government to enforce the enactment of the set policies by National institute of standards and Technology towards implementing the identified plans (Stuttard & Pinto, 2011).
The huge volume and traffic that flows across various websites requires a critical analysis to clearly device a method that can handle the current state of the problem while considering the future. Defining who is the authorized person to access the information is in the websites from those hackers and malicious users is the only way to go through adoption of the domain name system security extension concerns (Cross, 2007). This hence makes the exercise to complicated and expensive to go about raising the need for a strong financial support from the government.
System development is an ever dynamic event that will always adjust to meeting the needs of the users, government and also the international trade. Planning by the government in one way or the other will mean soliciting for the financial requirements, looking for the source of necessary equipment and eventually identifying those qualified personnel to conduct the transitional event within the set time frame (Shema, 2010).
Having all the requirements at hand will not mark the end but another unique ambiguous task will be earned on how to guard the knowledge of the developers not to be the enemy to the system. By this it means maintaining a good relationship with its developers to avoid malicious attack from their side since they have an idea of how to go about with the system.
In conclusion, working towards a safe and secure websites with trustable server working operating system is a major goal to ending the ever growing malicious and cyber-attacks. However, as a means to ending this, there is a need to work as a unit ranging from the individual websites to the federal agencies.


Stuttard, D., and Pinto, M. (2011). The web application hacker’s handbook. Indianapolis: Wiley.
Shema, M. (2010). Seven deadliest web application attacks. Amsterdam: Syngress/Elsevier Science.
Cross, M. (2007). Web application vulnerabilities. Burlington, MA: Syngress Pub.