Implement security for applications

Assignment Help Computer Engineering
Reference no: EM133337886

1. you are required to Implement security for applications by creating a simple e-Commerce and Learning Management System using the following platforms:

  • Shopify.com
  • Schoology.com

2. In implementing security for the above two applications, you should be able to observe the following criteria:

  1. Every platform should be good for 30 users, 2 office managers and 1 IT manager
  2. You should be able to use:
  • industry standard hardware and networking relating to implementing security for applications
  • industry standard programming algorithms and object-oriented programming used to implement applications security
  • mathematics required for programming algorithms 

3. Implement policy-based code-access security by:

  • identifying purpose of application security in software development
  • configuring required platform security configuration files using security configuration tools
  • defining required restriction custom code access permission and restrict access to protected resources
  • defining required access restriction custom code access and run protected operations

4. Implement security access control by:

  • planning and documenting authentication and authorisation strategy according to organisational policies and procedures
  • developing and document required application authentication and authorisation strategy

5. Write encrypt and decrypt code data by:

  • determining and documenting required standard cryptographic algorithms
  • encrypting, and decrypting, data using standard cryptographic algorithms

6. Protect application against injections by:

  • planning and documenting secure input and output handling and prevent vulnerabilities related to code injections
  • using secure input and output handling according to task requirements

Reference no: EM133337886

Questions Cloud

Select three elements that you believe would benefit : NSEI 6561 Walden University Select three elements that you believe would benefit the most if they were offshored and For each of these three components
Describe the restraining forces that inhibit growth-change : Describe the restraining forces that inhibit growth and change (think negative, emotional, illogical, unconscious, social/psychological).
Difference between secure boot and measured boot : What is the difference between secure boot and measured boot and What requirements must be met for an app to make use of a secure enclave
Write these to the pre-existing volume group named volgrp : Write the commands necessary to add these to the pre-existing volume group named volgrp, and to expand the lvmpart3 logical volume in that group by 6GB.
Implement security for applications : IT 501 Wells International College Implement security for applications by creating a simple e-Commerce and Learning Management System
What type of system development process technique : The luxury of taking a long time to consider all their options what type of system development process technique would you suggest?
Write a find command that finds all files : COMPUTER I CIS3512 Penn Foster College Write a sed command that will display all lines of the months file that do not contain the string March. What was
Implications for enchancing a depression website : State key policy (e.g., reimbursement), legal (e.g., FDA approval), standards that have (adherence required) implications for ENCHANCING A DEPRESSION WEBSITE?
Design the algorithm for function in pseudo-code : Create a single Python program called caesar - design the algorithm for this function in pseudo-code

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd