Write a report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully-developed explanations, address each of the following:
Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site. Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified. Evaluate the OWASP Top 10 2017, found at https://www.owasp.org/images/7/72/0WASP_Top_10- 20172/028en%29.pdtpdf and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk. Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Note: Test the links to ensure they work before submitting your paper. Format your assignment according to the following formatting requirements: Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length. Include a reference page. Citations and references must follow professional business language format. The reference page is not included in the required page length. The specific course learning outcomes associated with this assignment are:
Analyze Web traffic and log files for malicious activities Analyze common Website attacks, weaknesses, and security best practices. Use technology and information resources to research issues in securing Web-based applications. Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.