Discuss the log file and how it could be used

Assignment Help Python Programming
Reference no: EM133463114

Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional knowledge applied using Python functionality.

Python Applications for this lab: (total 100 points):

Question 1. In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create:

a. Password update Form - This Python form allows a previously registered user to reset their password after they have successfully logged in.

b. Authentication functions - These Python functions will check the following NIST SP 800-63B criteria are met upon password update:
• Use the previous criteria for password length and complexity. (This work should already be done.)
• Compare the prospective secrets against a list that contains values known to be commonly- used, expected, or compromised (Provided as CommonPasswords.txt).
• If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret.

c. Logger - Create a log to log all failed login attempts. The Log should include date, time and IP address.

Hints:
1. Start early. This will take you longer than you think.
2. Leverage the File I/O, Flask and Data structures work previously performed in the class.
3. Use functions to enhance code reuse and modularity.
4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons.
5. Use comments to document your code
6. Test with many combinations.
7. Use pylint to verify the code style - the goal is a 10!

Question 2. Using the Decrypting Secret Messages sites found in this week's readings, decrypt the following messages.

a. - .... .. ... / ... -.. . ...- / ...-- ----- ----- / -.-. .-.. .- ...
... / .... .- ... / ... --- -- . / ... - .-. .- -. --. . / .-. . --.-
..- . ... - ... .-.-.-

b. U28gdGhpcyBpcyBiYXNlNjQuIE5vdyBJIGtub3cu
c. --- Psuwb Ysm ----
W oa gc qzsjsf. Bc cbs qcizr dcggwpzm twuifs hvwg cih.
--- Sbr Ysm ---

Provide the decoded message along with the Cipher and any other parameters you used to solve each puzzle.
Hints:
1. Use the rumkin site
2. You will need to experiment some to narrow down the possible algorithms used. Some are more obvious than others.
3. You will know when you have selected the correct Cipher

Question 3. Document your results of the application running from your programming environment. You should also include and discuss your pylint results for the application. Provide your test results for each requirement in the Web application, associated functions and provide your resulting log files. Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions and how you tested each requirement. Include the Cipher tool results and write up in this document as well.

Reference no: EM133463114

Questions Cloud

How did that experience affect other relationships : Did you see things the way they really were, or were your eyes opened to something else? Was there any bias? How did that experience affect other relationships?
Discuss anything you feel is relevant to the materials : what we have addressed-offering any key insights, interesting critiques, and observations gained from the readings. Feel free to offer any views and opinions
Create the joint network defense bulletin : Create the Joint Network Defense Bulletin. Compile the information you have gathered, taking care to eliminate any sensitive bank-specific information.
How the writing styles or choices your peer has presented : Offer ideas on how the writing styles or choices your peer has presented might be strengthened in a persuasive writing context.
Discuss the log file and how it could be used : Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions
What do we mean by a product''s country of origin : What do we mean by a product's country of origin? What determines it? Why is it important to accurately state the product's country of origin?
What are the personal and communal ethical factors : What are the personal and/or communal ethical factors that may be involved in determining the moral position of either side in that debate?
Describe a specific crisis involved a person or family : Describe a specific crisis involved a person or family. Analyze a crisis-related issue that the in individual is facing/will or may face.
Person with disability can face obstacles in society : A person with disability can face obstacles in society that are not faced by other people.

Reviews

len3463114

7/6/2023 10:45:12 PM

Score of Cipher Tools,/ 33.75 Documentation 22.5 points Document your results of the application running from your programming environment. You should also include and discuss your pylint results for the application. Provide your test results for each requirement in the Web application, associated functions and provide your resulting log files. Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions and how you tested each requirement. Include the Cipher tool results and write up in this document as well. Score of Documentation,/ 22.5 Total Score of Lab 8 -Grading Guidelines

len3463114

7/6/2023 10:44:49 PM

– These Python functions will check the following NIST SP 800-63B criteria are met upon password update: • Use the previous criteria for password length and complexity. (This work should already be done.) • Compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised (Provided as CommonPasswords.txt). • If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret. c. Logger – Create a log to log all failed login attempts. The Log should include date, time and IP address. Score of Web Form and Tools,/ 56.25 Cipher Tools 33.75 points Using the Decrypting Secret Messages sites found in this week’s readings, decrypt the following messages.

len3463114

7/6/2023 10:44:37 PM

Criteria Meets Criterion Score Web Form and Tools 56.25 points In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create: a. Password update Form – This Python form allows a previously registered user to reset their password after they have successfully logged in. b. Authentication functions

Write a Review

Python Programming Questions & Answers

  Write a function named shift that shifts all elements

Write a function named shift that shifts all elements by one to the right and move the last element Into the first position.

  Implement the main part of the program to interact

Suppose you are asked to design a software tool that helps an elementary school student learn arithmetic operations. The software allows the student.

  Create a list of valid entries and correct results for sets

Create a list of valid entries and the correct results for each set of entries. Then, make sure that the results are correct when you test with these entries.

  Design a GUI to display values using Tkinter

Need to design a GUI to display values using Tkinter which is satisfactory. Fix coding problem - my program continually slows down on every iteration

  Write a program which repeatedly reads numbers until

Write a program which repeatedly reads numbers until the user enters "done". Once "done" is entered, print out the total, count, and average of the numbers.

  Write program that read a text file and prints only odd line

Write a program that reads a text file and prints out only odd lines to the screen. Thus, lines 1, 3, 5,... only printed. Update your odd lines program (Q1) to write odd lines to the screen and write then lines to another file.

  Track the current position and direction of the ball

If the player chooses to play against an automated paddle, your program should control the motion of the paddle. You can track the current position and direction of the ball to estimate whether it should move up or down from its current position.

  Create a module currency which includes the functions

You are having a problem with writhing this code. Create a module currency, which includes the following three functions that do currency conversions.

  Write a program in python to draw a simplified face

Write a program in Python to draw a blue triangle in a drawing window. Write a program in Python that moves the triangle in an animated movement. Write a program in Python to draw a simplified face.

  Write a program that should control the motion of paddle

If the player chooses to play against an automated paddle, your program should control the motion of the paddle. You can track the current position and direction of the ball to estimate whether it should move up or down from its current position.

  Describe the original data for the city you are observing

Describe the original data for the city you are observing. Regression Analysis Hypothesis testing. Explain the hypothesis and the result by graph.

  Design and implement two related programs

CSP1150/CSP5110 Programming Principles Assignment - programming project (WordChain). You are required to design and implement two related programs

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd