Reference no: EM132945313
CT6042 Secure Coding
Learning Outcome 1: explain and evaluate the fundamental theories of a range of security failures that are due to software vulnerabilities.
Learning Outcome 2: apply techniques, tools and understanding for implementing secure software to avoid flaws.
Learning Outcome 3: critically evaluate security-enhanced programming models and use appropriate tools which help ensure security goals.
Learning Outcome 4: analyse security-critical code fragments and incorporate appropriate practices within a systems development methodology
The requirements for assessment 1:
Too many developers are prioritising functionality and performance over security. Either that, or they just don't come from a security background, so they don't have security in mind when they are developing the site, therefore leaving the business vulnerable.
Your task for this assignment is to write a secure software development framework/guideline that discusses five dangerous software errors such as Buffer Overruns. Your framework/guideline should include the following for each software error:
a) demonstrate how the vulnerability can be exploited with code examples?
b) demonstrate how the code was tested to identify vulnerability?
c) how to mitigate, what security measures were put into place?
d) test again to make sure the code is resilient to the chosen attack
Your framework should also include general discussion about:
a) the importance of Security Development Life Cycle
b) product risk assessment and risk analysis
You should include all implemented source code in the appendix of your report. Note that the appendix does not count towards your report word count.
You should carefully consider the following when writing your report:
• Style - suitable to be quickly read and comprehended.
• Content - relevant, clearly explained, logically organised.
• Authority - discussed concepts and ideas will need evidence in support.
• Practical understanding - your own practical examples, advice and demonstrations should be included.
• Technical understanding - understanding of the discussed system and consideration of comparison products.
• Comprehensiveness - you need to cover what you consider to be all the key topics.
• Helpfulness - practical examples, advice and demonstrations should be included
Attachment:- Secure Coding.rar