Implement security for applications

Assignment Help Computer Engineering
Reference no: EM133337886

1. you are required to Implement security for applications by creating a simple e-Commerce and Learning Management System using the following platforms:

  • Shopify.com
  • Schoology.com

2. In implementing security for the above two applications, you should be able to observe the following criteria:

  1. Every platform should be good for 30 users, 2 office managers and 1 IT manager
  2. You should be able to use:
  • industry standard hardware and networking relating to implementing security for applications
  • industry standard programming algorithms and object-oriented programming used to implement applications security
  • mathematics required for programming algorithms 

3. Implement policy-based code-access security by:

  • identifying purpose of application security in software development
  • configuring required platform security configuration files using security configuration tools
  • defining required restriction custom code access permission and restrict access to protected resources
  • defining required access restriction custom code access and run protected operations

4. Implement security access control by:

  • planning and documenting authentication and authorisation strategy according to organisational policies and procedures
  • developing and document required application authentication and authorisation strategy

5. Write encrypt and decrypt code data by:

  • determining and documenting required standard cryptographic algorithms
  • encrypting, and decrypting, data using standard cryptographic algorithms

6. Protect application against injections by:

  • planning and documenting secure input and output handling and prevent vulnerabilities related to code injections
  • using secure input and output handling according to task requirements

Reference no: EM133337886

Questions Cloud

Select three elements that you believe would benefit : NSEI 6561 Walden University Select three elements that you believe would benefit the most if they were offshored and For each of these three components
Describe the restraining forces that inhibit growth-change : Describe the restraining forces that inhibit growth and change (think negative, emotional, illogical, unconscious, social/psychological).
Difference between secure boot and measured boot : What is the difference between secure boot and measured boot and What requirements must be met for an app to make use of a secure enclave
Write these to the pre-existing volume group named volgrp : Write the commands necessary to add these to the pre-existing volume group named volgrp, and to expand the lvmpart3 logical volume in that group by 6GB.
Implement security for applications : IT 501 Wells International College Implement security for applications by creating a simple e-Commerce and Learning Management System
What type of system development process technique : The luxury of taking a long time to consider all their options what type of system development process technique would you suggest?
Write a find command that finds all files : COMPUTER I CIS3512 Penn Foster College Write a sed command that will display all lines of the months file that do not contain the string March. What was
Implications for enchancing a depression website : State key policy (e.g., reimbursement), legal (e.g., FDA approval), standards that have (adherence required) implications for ENCHANCING A DEPRESSION WEBSITE?
Design the algorithm for function in pseudo-code : Create a single Python program called caesar - design the algorithm for this function in pseudo-code

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the key difference between viruses and malicious cod

explain the key differences between viruses and other malicious codes and Identify at least three (3) different types of viruses, and describe the main differences between each one.

  Explain the reasons for creating user groups and permissions

Explain the reasons for creating user groups and permissions. Describe the process for setting these with a GUI and CLI. Submit a one to two-page paper.

  Find and print the maximum element in the tree

Write a java program to find n factorial. Program must use Recursion Write a program implementing a binary search tree.

  Paste image of linear programming results window

A linear programming problem cost minimization problem has objective function: Minimize X +Y. Use QM for Windows to plot the feasible region. Paste image of Linear Programming Results window and Solution List window here

  Clearly explain and describe at least three merits of

q1. clearly describe and discuss at least three advantages of clustering.q2. explain in detail why the average seek

  Take a string parameter and returns a string containing

Write a function called scramble_words, which takes a string parameter and returns a string containing the same words but randomly reordered.

  Write a one-page guide to help user of your computer system

Write a one-page guide to help a user of your computer system select one of our sorting algorithms according to the desired application.

  Threat information whether physical or technological

This week you are to look at datasets that relate to threat information whether physical or technological. Create a presntation regarding your findings.

  Write a matlab statement to accomplish the task

Ask users how many parts they wish to buy based on what they select in Part-a. Store the response in a variable named NumParts.

  Write a single sql statement to list all the tracks

Write a single SQL statement to list all the tracks that have the exact word 'time' as part of the name in the Track table.

  What differences between friend function and member function

Use a member function to overload the multiplication operator for the Stone wt class. What are the differences between a friend function and a member function?

  Write 8086 program to find the more number repeated

Write 8086 program to find the more number repeated in list of 10 numbers starting from DS:0011 to DS:001A and save value of this number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd