Demonstrate for each of two applications they are vulnerable

Assignment Help JAVA Programming
Reference no: EM131626253

Assignment

Demonstrating Insecure Interaction between Components

Overview

In this homework you use Netbeans to create two different unique and complete demonstrations of insecure interaction between components such as SQL Injection, Command Line Injection, Cross-Site Scripting, Unrestricted Upload of File with Dangerous Type, Cross-Site Request Forgery (CSRF), and URL Redirection to Untrusted Site ('Open Redirect'). You will demonstrate and describe how to fix each of the problems. Therefore, a total of four code samples will be created. Two will have insecure interaction between components and two will have the issues fixed.

Assignment Details

Be sure you have carefully read and understand the materials in week 1 and 2 as well as successfully configured your environment.

1. Select 2 CWE/SANS Top 25 vulnerabilities under the category of Insecure Interaction between Components. Review and try the existing examples in links in the classroom. Use Netbeans to experiment. Work in multiple languages where possible.

2. Using Netbeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should not just be a code snippet. It should be part of a small application. In other words, you need to adapt the examples provided in the documentation to something more meaningful and substantive. It doesn't have to be a large, overly complex application, but it needs to be complete, and runnable and demonstrate how this vulnerability may appear in the real world.

3. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed.

4. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in each of the two examples you created in step 2.

5. Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.

Reference no: EM131626253

Questions Cloud

Design and develop a website : COIT 20268 - Responsive Web Design (RWD) Assignment. Design and develop a website. The goal is to allow potential visitors to obtain overview of museum layout
Controllable factors to optimize the yield of process : Determine levels of controllable factors to optimize the yield of a process or minimize the variation of a response variable.
Find the macaulay duration : Find the Macaulay duration and the modified duration of a 20-year, 10% corporate bond priced to yield 8%. According to the modified duration of this bond.
Example of human technology interface : Consider an example of human technology interface in healthcare from clinical technology to administrative or electronic data.
Demonstrate for each of two applications they are vulnerable : Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of th
Keeping in mind the constraints of perfect competition : Keeping in mind the constraints of perfect competition,
What a democratice-capitalistic society : Explain what a democratice-capitalistic society is and the impact it has on the compensation practices in the US.
Calculate the net profits after taxes : Doris Wise is a young career woman. She lives in Phoenix, Arizona, where she owns and operates a highly successful modeling agency.
Choose his or her doctors with the advent of the ppaca : Explore and explain whether the patients will be able to continue with their physicians and the rationale behind the plan cancelation.

Reviews

Write a Review

JAVA Programming Questions & Answers

  Recursive factorial program

Write a class Array that encapsulates an array and provides bounds-checked access. Create a recursive factorial program that prompts the user for an integer N and writes out a series of equations representing the calculation of N!.

  Hunt the wumpus game

Reprot on Hunt the Wumpus Game has Source Code listing, screen captures and UML design here and also, may include Javadoc source here.

  Create a gui interface

Create GUI Interface in java programing with these function: Sort by last name and print all employees info, Sort by job title and print all employees info, Sort by weekly salary and print all employees info, search by job title and print that emp..

  Plot pois on a graph

Write a JAVA program that would get the locations of all the POIs from the file and plot them on a map.

  Write a university grading system in java

University grading system maintains number of tables to store, retrieve and manipulate student marks. Write a JAVA program that would simulate a number of cars.

  Wolves and sheep: design a game

This project is designed a game in java. you choose whether you'd like to write a wolf or a sheep agent. Then, you are assigned to either a "sheep" or a "wolf" team.

  Build a graphical user interface for displaying the image

Build a graphical user interface for displaying the image groups (= cluster) in JMJRST. Design and implement using a Swing interface.

  Determine the day of the week for new year''s day

This assignment contains a java project. Project evaluates the day of the week for New Year's Day.

  Write a java windowed application

Write a Java windowed application to do online quiz on general knowledge and the application also displays the quiz result.

  Input pairs of natural numbers

Java program to input pairs of natural numbers.

  Create classes implement java interface

Interface that contains a generic type. Create two classes that implement this interface.

  Java class, array, link list , generic class

These 14 questions covers java class, Array, link list , generic class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd