638054877497077243CSE 20CS54I W8 D3 Ms PT
638054877497077243CSE 20CS54I W8 D3 Ms PT
638054877497077243CSE 20CS54I W8 D3 Ms PT
CYBER SECURITY
(V Semester)
Development(Week-8)
Day 3
Session 1
Course Code: 20CS54IP
Computer Science and Engineering
BASICS OF WEB
WEB VULNERABILITIES
BURP SUITE ESSENTIALS
CLOUD VUNERABILITIES
INTRODUCTION TO TOOLS
NESSUS
NMAP
PROWLER
1 Cloud Misconfiguration
4. Insecure APIs
Having a secure API is critical to ensuring cyber threat
mitigation and to protect against unwanted traffic.
5. Lack of Visibility
Lack of visibility of cloud infrastructure is a major issue
that can delay action on a threat and result in a data breach.
When companies are using thousands of instances of
cloud services, it can be easy to get lost in them or forget about
some of those running instances.
7. Malicious Insiders
This can result from too loose of rules or a former employee still
having valid credentials to the accounts
This kind of vulnerability can be particularly dangerous, as not
only data is at risk of being stolen or changed, but also intellectual
property.
TCP Scan
UDP Scan
SYN Scan
ACK Scan
Full Scan