SlideShare a Scribd company logo
1 of 16
A Security Reinforcement
Project
COURSE/BLOCK: BSIT 3B
NAME OF WEBSITE: OTSOMOTO
GROUP MEMBERS: MA. LIANNE ISABEL D. TALENTO
JESSIE JAMES D. SEDEÑO
ADRIAN SAMUEL S. OLLERES
Part 1
Security Reinforcement
TABLE OF CONTENT
TOPICS SLIDES NUMBER
WEBSITE NAME 4
Website Mission / Vision 5
Project Overview
ExistingWebSystemVulnerabilities
How SecurityMeasuresisImplemented
MitigationActionImplemented
ConclusionandFutureEnhancements
Part 2
White Hat Test for the Reinforced Website
IdentifiedVulnerability
Recommendation
DIGITAL WAVE
This electronic commerce site offers a Social Media Marketing, Email
Marketing, Content Marketing. Our platform is dedicated to helping the users to
acquire the skills and knowledge necessary to succeed in the world of digital
marketing, particularly in the realm of e-commerce. Customers can select their
preferred skills to acquire from Social Media, Email, Content Marketing. In addition,
this site contains all the information needed to know to encourage a customer to
make a purchase. Product descriptions were included, while in terms of the mode of
payment, customers have multiple choices, such as GCash, Paypal and Paymaya.
Mission Vision
At our core, we are on a mission to
empower individuals in the dynamic
landscape of digital marketing within the
e-commerce realm. We strive to provide a
comprehensive electronic commerce
platform that specializes in Social Media
Marketing, Email Marketing, and Content
Marketing. Our mission is to equip users
with the skills and knowledge essential for
thriving in the digital marketing sphere,
fostering their success in the world of e-
commerce.
We envision a future where every individual
aspiring to excel in digital marketing finds a
dedicated and resourceful platform. Our
vision is to be the foremost destination for
users seeking to acquire and enhance their
skills in Social Media, Email, and Content
Marketing. We aim to create an
environment where users not only gain
knowledge but also find all the information
required to make informed purchase
decisions. Our vision extends to providing a
seamless experience, offering multiple
payment options such as GCash, Paypal, and
Paymaya, ensuring accessibility and
convenience for our valued customers.
Project Overview
Scope
The digital wave spans diverse fields - digital marketing, e-
commerce, social media, cloud computing, AI, and big data. It
opens avenues for businesses to connect with customers
through digital channels, fostering new opportunities. This
wave facilitates collaboration and communication globally,
transcending geographic and time constraints. Across
industries like healthcare, education, finance, and
entertainment, the digital wave transforms operations with
advanced tools and resources.
Goals
Leverage the digital wave's power for effective customer
engagement, global collaboration, and transformative industry
impact across digital marketing, e-commerce, and various sectors.
Our digital wave initiative aims to elevate customer engagement, global collaboration, and industry
impact. Key strategies involve leveraging digital channels and technologies, supported by a clear
implementation plan with timelines and milestones. We've identified specific performance
indicators to measure success and outlined risk mitigation strategies. The documentation covers
resource needs, tools, and technologies, as well as considerations for training and support. This
concise guide provides stakeholders with a clear roadmap for the initiative's success, summarizing
key points and outlining next steps.
Documentation
Existing Web System Vulnerabilities
Vulnerability Screenshots
Injection Attacks
Cross-Site Scripting (XSS)
Authentication Issues
Teacher’s Note:
Actual Picture of the Front-End and
Back-End/Code that is susceptible to
any threat
Existing Web System Vulnerabilities
Vulnerability Description
Injection Attacks Identify and prevent SQL and code injections
that can lead to data breaches and unauthorized
access.
Cross-Site Scripting (XSS) Detect and mitigate XSS vulnerabilities to
prevent malicious scripts from running in users'
browsers.
Authentication Issues Strengthen authentication mechanisms to
prevent unauthorized access and enhance user
account security.
Teacher’s Note:
This is just a sample students are free
to give their own identified
vulnerability minimum of 3
maximum of 6
How Security Measures is Implemented
1 Secure Coding Practices
Enforce coding practices like input validation, output encoding, and secure API
implementation to prevent common vulnerabilities.
2 Access Controls
Implement granular access controls and role-based permissions to restrict
unauthorized access to sensitive resources.
3 Encryption
Apply strong encryption algorithms to protect data both at rest and in transit,
ensuring confidentiality and integrity.
Mitigation Action Implemented
Vulnerability Screenshots
Injection Attacks
Cross-Site Scripting (XSS)
Authentication Issues
Teacher’s Note:
Show your improved code that could
possible counter the identified
vulnerability. And Provide
Explanation how it work
Conclusion and Future
Enhancements
By reinforcing the security of the existing web system, we have mitigated
vulnerabilities, protected user data, and ensured system integrity. Further
enhancements can focus on threat intelligence integration and proactive
security measures to stay ahead of emerging threats.
Part 2
White Hat Test for the Reinforced Website
WHITE HAT TESTING
Name of Website for White Hat
Testing
<Screenshot of Website for White Hat Test>
Identified Vulnerability
1.
2.
3.. …
<Screenshot of Website for White Hat Test>
A-Security-Reinforcement-Project Template.pptx

More Related Content

Similar to A-Security-Reinforcement-Project Template.pptx

Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDeepakGupthaS
 
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...Joe Lamantia
 
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT
 
AnkitaGoyal-Resume
AnkitaGoyal-ResumeAnkitaGoyal-Resume
AnkitaGoyal-ResumeAnkita Goyal
 
Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...Earthbound Media Group
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
Marketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers todayMarketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers todayTony Davis
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?Aggregage
 
Client review-portfolio
Client review-portfolioClient review-portfolio
Client review-portfolioSushmita Dutt
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)Muneesh Batra
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)Muneesh Batra
 
Management Science Company Report Part II
Management Science Company Report Part IIManagement Science Company Report Part II
Management Science Company Report Part IIAfiqah Zariful
 
COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)Farah Sham
 
Ideaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application DevelopmentIdeaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application DevelopmentKamal Singh
 
I-Bytes Financial services Industry
I-Bytes Financial services IndustryI-Bytes Financial services Industry
I-Bytes Financial services IndustryEGBG Services
 
Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net Mithun Patra
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
 

Similar to A-Security-Reinforcement-Project Template.pptx (20)

Digital marketing-presentation-tech smarties
Digital marketing-presentation-tech smartiesDigital marketing-presentation-tech smarties
Digital marketing-presentation-tech smarties
 
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
 
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
 
Thesis
ThesisThesis
Thesis
 
AnkitaGoyal-Resume
AnkitaGoyal-ResumeAnkitaGoyal-Resume
AnkitaGoyal-Resume
 
A Guide Developing an E-Commerce App Like Boxed
A Guide Developing an E-Commerce App Like BoxedA Guide Developing an E-Commerce App Like Boxed
A Guide Developing an E-Commerce App Like Boxed
 
Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...Customizing Your Content Management System to Work for Your Higher Education ...
Customizing Your Content Management System to Work for Your Higher Education ...
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
Marketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers todayMarketing ecosystem: 7 challenges facing marketers today
Marketing ecosystem: 7 challenges facing marketers today
 
The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?The Product Dev Conundrum: To Build or Buy in a Digital World?
The Product Dev Conundrum: To Build or Buy in a Digital World?
 
Client review-portfolio
Client review-portfolioClient review-portfolio
Client review-portfolio
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Management Science Company Report Part II
Management Science Company Report Part IIManagement Science Company Report Part II
Management Science Company Report Part II
 
COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)COMPANY REPORT (PART 2)
COMPANY REPORT (PART 2)
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
 
Ideaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application DevelopmentIdeaworks Solutions Pvt Ltd- Mobile Application Development
Ideaworks Solutions Pvt Ltd- Mobile Application Development
 
I-Bytes Financial services Industry
I-Bytes Financial services IndustryI-Bytes Financial services Industry
I-Bytes Financial services Industry
 
Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net Mithun resume 8_years_dot_net
Mithun resume 8_years_dot_net
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

A-Security-Reinforcement-Project Template.pptx

  • 1. A Security Reinforcement Project COURSE/BLOCK: BSIT 3B NAME OF WEBSITE: OTSOMOTO GROUP MEMBERS: MA. LIANNE ISABEL D. TALENTO JESSIE JAMES D. SEDEÑO ADRIAN SAMUEL S. OLLERES
  • 3. TABLE OF CONTENT TOPICS SLIDES NUMBER WEBSITE NAME 4 Website Mission / Vision 5 Project Overview ExistingWebSystemVulnerabilities How SecurityMeasuresisImplemented MitigationActionImplemented ConclusionandFutureEnhancements Part 2 White Hat Test for the Reinforced Website IdentifiedVulnerability Recommendation
  • 4. DIGITAL WAVE This electronic commerce site offers a Social Media Marketing, Email Marketing, Content Marketing. Our platform is dedicated to helping the users to acquire the skills and knowledge necessary to succeed in the world of digital marketing, particularly in the realm of e-commerce. Customers can select their preferred skills to acquire from Social Media, Email, Content Marketing. In addition, this site contains all the information needed to know to encourage a customer to make a purchase. Product descriptions were included, while in terms of the mode of payment, customers have multiple choices, such as GCash, Paypal and Paymaya.
  • 5. Mission Vision At our core, we are on a mission to empower individuals in the dynamic landscape of digital marketing within the e-commerce realm. We strive to provide a comprehensive electronic commerce platform that specializes in Social Media Marketing, Email Marketing, and Content Marketing. Our mission is to equip users with the skills and knowledge essential for thriving in the digital marketing sphere, fostering their success in the world of e- commerce. We envision a future where every individual aspiring to excel in digital marketing finds a dedicated and resourceful platform. Our vision is to be the foremost destination for users seeking to acquire and enhance their skills in Social Media, Email, and Content Marketing. We aim to create an environment where users not only gain knowledge but also find all the information required to make informed purchase decisions. Our vision extends to providing a seamless experience, offering multiple payment options such as GCash, Paypal, and Paymaya, ensuring accessibility and convenience for our valued customers.
  • 6. Project Overview Scope The digital wave spans diverse fields - digital marketing, e- commerce, social media, cloud computing, AI, and big data. It opens avenues for businesses to connect with customers through digital channels, fostering new opportunities. This wave facilitates collaboration and communication globally, transcending geographic and time constraints. Across industries like healthcare, education, finance, and entertainment, the digital wave transforms operations with advanced tools and resources. Goals Leverage the digital wave's power for effective customer engagement, global collaboration, and transformative industry impact across digital marketing, e-commerce, and various sectors. Our digital wave initiative aims to elevate customer engagement, global collaboration, and industry impact. Key strategies involve leveraging digital channels and technologies, supported by a clear implementation plan with timelines and milestones. We've identified specific performance indicators to measure success and outlined risk mitigation strategies. The documentation covers resource needs, tools, and technologies, as well as considerations for training and support. This concise guide provides stakeholders with a clear roadmap for the initiative's success, summarizing key points and outlining next steps. Documentation
  • 7. Existing Web System Vulnerabilities Vulnerability Screenshots Injection Attacks Cross-Site Scripting (XSS) Authentication Issues Teacher’s Note: Actual Picture of the Front-End and Back-End/Code that is susceptible to any threat
  • 8. Existing Web System Vulnerabilities Vulnerability Description Injection Attacks Identify and prevent SQL and code injections that can lead to data breaches and unauthorized access. Cross-Site Scripting (XSS) Detect and mitigate XSS vulnerabilities to prevent malicious scripts from running in users' browsers. Authentication Issues Strengthen authentication mechanisms to prevent unauthorized access and enhance user account security. Teacher’s Note: This is just a sample students are free to give their own identified vulnerability minimum of 3 maximum of 6
  • 9. How Security Measures is Implemented 1 Secure Coding Practices Enforce coding practices like input validation, output encoding, and secure API implementation to prevent common vulnerabilities. 2 Access Controls Implement granular access controls and role-based permissions to restrict unauthorized access to sensitive resources. 3 Encryption Apply strong encryption algorithms to protect data both at rest and in transit, ensuring confidentiality and integrity.
  • 10. Mitigation Action Implemented Vulnerability Screenshots Injection Attacks Cross-Site Scripting (XSS) Authentication Issues Teacher’s Note: Show your improved code that could possible counter the identified vulnerability. And Provide Explanation how it work
  • 11. Conclusion and Future Enhancements By reinforcing the security of the existing web system, we have mitigated vulnerabilities, protected user data, and ensured system integrity. Further enhancements can focus on threat intelligence integration and proactive security measures to stay ahead of emerging threats.
  • 12. Part 2 White Hat Test for the Reinforced Website
  • 14. Name of Website for White Hat Testing <Screenshot of Website for White Hat Test>
  • 15. Identified Vulnerability 1. 2. 3.. … <Screenshot of Website for White Hat Test>