+1 (208) 254-6996 [email protected]
  

 The  network restrictions surrounding the web authentication service is one  layer of defense. As was noted, this component is too valuable to trust  to a single defense. Furthermore, authentication requests are tendered  by the least-trusted component in the architecture. That component, HTTP  termination, resides on the least-trusted network. What additional  steps can be taken?
 

Answer  the questions in an APA-formatted paper with in-text citation.  Response should have a minimum of 500 words. Minimum of two references are required.

Don't use plagiarized sources. Get Your Custom Essay on
Web Authentication Service
Just from $13/Page
Order Essay

SafeAssign Originality Report Fall 2021 – Security Architectu… • Chapter #6 Assignment

%52Total Score: High riskLakshmi Narayana Pothakamuri Submission UUID: aea23ed3-5b6f-a5d4-e394-e339f53fcab2

Total Num …

1 Highest M …

52 % Week 3 Chapt…

Average M …

52 % Submitted …

11/0… 09:36 PM CST

Average W …

653 Highest: Wee…

View Originality Report – Old Design

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

1 of 9 11/9/2021, 3:19 PMhttps://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=9c1d3709-be55-4f50-b5c7-dfd522029ed2&course_id=_143524_1&download=true&includeDeleted=true&print=true&force=truehttps://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=9c1d3709-be55-4f50-b5c7-dfd522029ed2&course_id=_143524_1&download=true&includeDeleted=true&print=true&force=true

%34

%17

%1

%52Attachment 1

Institutional database  (7)

S… S… S…

S… S… S…

S…

Global database  (3)

S… S… S…

Scholarly journals & publications  (1)

P…

Top sources  (3)

Excluded sources  (0)

Word Count: 653

Week 3 Chapter 6 Assignment.docx

4 6 9

1 2 5

3

8 7 11

10

4 S…

6 S…

8 S…

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

2 of 9 11/9/2021, 3:19 PM

Running Head: Web Authentication Service 1

Web Authentication Service 4

Security Architecture & Design

ISOL-536-B05

Chapter#6 Assignment

Submitted to

Adjunct Professor Dr. Charles DeSassure

University of Cumberlands

Lakshmi Narayana Pothakamuri

11/06/2021

What would be done is authenticating the communication from the termination of the HTTP prior to the user requests get pro- cessed so as to minimize the surface of the attack. This indi-

cates that the authentication system should authenticate the com- ponent of the HTTP which helps in protecting the network from any attacks via a DMZ network that is compromised. The HTTP spoofing attempts may get safeguarded while authenticating the requests of the user cannot stop the attacks coming from the web server itself. The essence of a rigorous input validation is neces- sary for every user request. Though others might consider this as an overkill, the truth is the aim of this is to make the authentication services maker one that is robust and get to resist every request that is false. In addition, it is necessary to ensure that the compo- nents that are build are capable of resisting the components fail-

1

2

3

4

5

4

6

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

3 of 9 11/9/2021, 3:19 PM

ure more so the ones that get easily exposed (Esfahani, et.al, 2019). Another issue that is crucial is the authentication requests construction gets to be based on the credentials that the user sup- plies. A few of the networks components that are taken into ac- count as exposed may originate from various networks that are hostile like user ID as well as passwords, due to this, every compo- nent that participates in the service of authentication should end up meeting the rules plus standards that are strict for the compo- nents exposed to the internet. Every item exposed to the said risk should get configured and ensure they resist the network fails plus the popular web attacks. Maintaining the site admin security

posture, authentication service access should be from the server of jump access. Configuration files should get authenticated for it to become the prime attacker. Configuration of the file is sup-

posed to get accessed by the side of the admin from the host of authentication. Through this the hackers are supposed to compro- mise the service of authentication to have the file accessed. Additionally, the files may rely on the defense of the services and the authentication. Therefore, the process of collecting and making requests of the facts may elaborate regarding the authentication procedure. The components can also be protected from becoming vulnerable through creation of appropriate port controls on every available port as well as by linking through use of a secure connec- tion that is remote like TLS or VPN. The VPN may be costly to pur- chase as well as maintain, however the truth is it relies on the de- gree of the cost (Wang and Sun, 2020, September). Through fore- going the controls of transmission in addition to encryption choices that are offered authentication may stay functioning for a particular extended duration. To secure the payments that are on- line which get to be conducted on VPN is safeguarded through use of VPN tunneling. For an attacker to be prevented from gaining ac- cess to the VPN, the connection can be authenticated between the two entities. At the absence of authentication, an attacker may make attempts to gain entry into the system. An additional way of protecting the network is through creation of firewalls that are ro- bust as well as applications that are capable of handling the at-

4

4

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

4 of 9 11/9/2021, 3:19 PM

Source Matches (17)

Student paper 71%

Student paper 100%

tacks with ease.

References

Esfahani, A., Mantas, G., Ribeiro, J., Bastos, J., Mumtaz, S.,

Violas, M. A.,. & Rodriguez, J. (2019). An efficient Web authen-

tication mechanism preventing man-in-the-middle attacks in indus- try 4.0 supply chain. IEEE Access, 7, 58981-58989.

https://ieeexplore.ieee.org/abstract/document/8704724/ Wang, Z., & Sun, W. (2020, September). Review of Web Authentication.

In Journal of Physics: Conference Series (Vol. 1646, No. 1,

p. 012009). IOP Publishing. https://iopscience.iop.org/article

/10.1088/1742-6596/1646/1/012009/meta

7

8

7 9

4

9 10

11

1

Student paper

Web Authentication Service 1 Web Authentication Service 4

Original source

HARDENING WEB AUTHENTICATION 1 Hardening Web Authentication Service

2

Student paper

Security Architecture & Design

Original source

Security Architecture & Design

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

5 of 9 11/9/2021, 3:19 PM

Student paper 63%

Student paper 100%

Student paper 100%

Student paper 63%

3

Student paper

ISOL-536-B05

Original source

ISOL-536-M30

4

Student paper

Chapter#6 Assignment

Original source

Chapter # 6 Assignment

5

Student paper

University of Cumberlands

Original source

University of the Cumberlands

4

Student paper

11/06/2021

Original source

11/07/2021

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

6 of 9 11/9/2021, 3:19 PM

Student paper 66%

Student paper 70%

Student paper 63%

6

Student paper

This indicates that the authentication system should authenticate the com- ponent of the HTTP which helps in protecting the network from any at- tacks via a DMZ network that is com- promised.

Original source

The systems used in authentication authenticate the components of HTTP, which help in protecting the network from attacks that come from the DMZ network that has been compromised

4

Student paper

Maintaining the site admin security posture, authentication service access should be from the server of jump ac- cess.

Original source

For maintaining the posture of the se- curity, the admin can access the ser- vices of authentication that can be jumped from over the server of access

4

Student paper

Configuration of the file is supposed to get accessed by the side of the ad- min from the host of authentication.

Original source

This configuration can be accessed with the help of the admin from the host of the authentication

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

7 of 9 11/9/2021, 3:19 PM

Student paper 100%

Student paper 100%

Student paper 100%

Student paper 68%

7

Student paper

Esfahani, A., Mantas, G., Ribeiro, J., Bastos, J., Mumtaz, S., Violas, M.

Original source

Esfahani, A., Mantas, G., Ribeiro, J., Bastos, J., Mumtaz, S., Violas, M

8

Student paper

An efficient Web authentication mech- anism preventing man-in-the-middle attacks in industry 4.0 supply chain.

Original source

An efficient Web authentication mech- anism preventing man-in-the-middle attacks in industry 4.0 supply chain

7

Student paper

IEEE Access, 7, 58981-58989.

Original source

IEEE Access, 7, 58981-58989

9

Student paper

https://ieeexplore.ieee.org/abstract /document/8704724/ Wang, Z., & Sun, W.

Original source

https://ieeexplore.ieee.org/abstract /document/9204396/

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

8 of 9 11/9/2021, 3:19 PM

Student paper 100%

Student paper 100%

ProQuest document 100%

Student paper 85%

4

Student paper

Review of Web Authentication.

Original source

Review of Web Authentication

9

Student paper

In Journal of Physics:

Original source

In Journal of Physics

10

Student paper

Conference Series (Vol.

Original source

Conference Series, Vol

11

Student paper

https://iopscience.iop.org/article /10.1088/1742-6596/1646/1 /012009/meta

Original source

https://iopscience.iop.org/article /10.1088/1742-6596/1450/1 /012029/meta

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

9 of 9 11/9/2021, 3:19 PM

Order your essay today and save 10% with the discount code ESSAYHELP