Create your own unique full example for the 2 vulnerability

Assignment Help Computer Engineering
Reference no: EM132087394

Overview

In this homework you use Netbeans to create two different unique and complete demonstrations of insecure interaction between components such as SQL Injection, Command Line Injection, Cross-Site Scripting, Unrestricted Upload of File with Dangerous Type, Cross-Site Request Forgery (CSRF), and URL Redirection to Untrusted Site ('Open Redirect').

You will demonstrate and describe how to fix each of the problems. Therefore, a total of four code samples will be created. Two will have insecure interaction between components and two will have the issues fixed.

Assignment Details

Be sure you have carefully read and understand the materials in week 1 and 2 as well as successfully configured your environment.

1. Select 2 CWE/SANS Top 25 vulnerabilities under the category of Insecure Interaction between Components. Review and try the existing examples in links in the classroom. Use Netbeans to experiment. Work in multiple languages where possible.

2. Using Netbeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should not just be a code snippet.

It should be part of a small application. In other words, you need to adapt the examples provided in the documentation to something more meaningful and substantive. It doesn't have to be a large, overly complex application, but it needs to be complete, and runnable and demonstrate how this vulnerability may appear in the real world.

3. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed.

4. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in each of the two examples you created in step 2.

5. Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.

Deliverables

Provide all of your source files for this assignment. Two source code files will have software vulnerabilities. The remaining two will have the issues fixed. Provide any supplemental or utility files supporting your main source files.

Reference no: EM132087394

Questions Cloud

Control of resources in sphere of the world : How did Social Darwinism play into Japan's quest for control of resources in its sphere of the world?
Should sanchez start accepting credit cards and debit cards : Should Sanchez start accepting credit cards and debit cards? Show the computations of net income under her present arrangement and under the plan
How do you do this using just basic v programing : The owners of the Super Supermarket would like to have a program that computes the monthly gross pay of their employees as well as the employee's net pay.
Prepare a schedule that shows the net cash flow : Ballard Co. reported $145,880 of net income for 2014. Prepare a schedule that shows the net cash flow from operating activities using the indirect method
Create your own unique full example for the 2 vulnerability : Create your own unique, full example for each of the 2 vulnerabilities in this category. Demonstrate for each of the two applications they are vulnerable.
Write a memo explaining what cloud computing is : The owner of CSM Tech Publishing is always thinking about how he can use technology to improve the operation of his business.
Create potential new opportunities from trial : Design teams isolated purposefully to keep from being interrupted - company culture of innovation goes beyond the individual teams and must be fully adopted
Importance of executive branch operations : What is the importance of executive branch operations in implementation of the legislation?
Develop a java 2d graphics application : Develop a Java 2D graphics application that creates 3 images. Prepare, conduct and document a test plan verifying each method.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd