Question 1a what is the disparity between encryption and

Assignment Help PHP Web Programming
Reference no: EM13349379

QUESTION 1

(a) What is the disparity between encryption and hashing?

(b) Why is it not always probable to use a white list-based approach to input validation?

(c) What are the most significant steps you would advise for securing a new web server and a new web application?

(d) A central safekeeping prerequisite that virtually any application needs to meet is controlling users' access to its data and functionality.

(i) Briefly outline the trio of interrelated safekeeping mechanisms that most web applications use to lever user access.

(ii) Why are an application's mechanisms for handling user access merely as brawny as the weakest of these components?

(e) The core safekeeping problem faced by web applications occurs in any situation where an application must agree to and process untrusted data that may be malicious. On the other hand, in the case of web applications, several issues have united to exacerbate the problem and give details why so many web applications on the Internet today do such a poor job of addressing it. Briefly sketch these key problem factors.

QUESTION 2

(a) Provide a potential safekeeping problem when using "$_REQUEST ['var']" in PHP in its place of the dedicated super global.

(b) Provide two ways to implement sessions in HTTP. State the benefits and disadvantages of each method.

(c) An application developer wants to stop an attacker from performing brute force attacks against the login function. For the reason that the attacker may target multiple usernames, the developer come to a decisions to store the number of failed efforts in an encrypted cookie, blocking any request if the number of unsuccessful efforts exceeds five. How can this defence be bypassed?

(d) Think about the following piece of PHP code:

<?php
session_regenerate_id();
$_SESSION['logged_in'] = TRUE;
?>

Give details for the purpose of the above code?

(e) Explicate the idea behind the CSRF attack? Give an instance of how such an attack can be performed.

(f) Someone designing an application for which safekeeping is remotely imperative must presuppose that it will be directly targeted by dedicated and skilled attackers. A key role of the application's safekeeping mechanisms is being able to handle and react to these attacks in a controlled way. Briefly outline the likely measures implemented to handle attackers.

QUESTION 3

(a) What is the differentiation between persistent cookies and session cookies?

(b) You have found SQL injection vulnerability but have been unable to carry out any useful assaults, as the application rejects any input containing whitespace. How can you work roughly this restriction?

(c) You have accepted a single quotation mark at numerous locations right through an application. From the resulting error communications you have diagnosed several potential SQL injection faults. Which one of the subsequent would be the safest location to test whether more crafted input has an effect on the application's processing, explaining your causatives?

(i) Registering a new user

(ii) Updating your personal details

(iii) Unsubscribing from the service

(d) Briefly draw round the different techniques and measures that can be employed to prevent SQL injection attacks

(e) What is the Cross Site Scripting (XSS) attack? Identify the two main categories of this type of attack and outline the outcomes of such an attack.

QUESTION 4

(a) Why can spot out all sources of user input for a moment be challenging when reviewing a PHP application?

(b) Briefly describe the session fixation attack and outline the mechanisms that can be employed to survive this attack.

(c) The architecture mechanism Linux, Apache, MySQL, and PHP are often bring into being installed on the same physical server. Why can this weaken the safekeeping posture of the application's architecture? (d) Chart the list of best practices that should be enforced when file uploads is allowed on websites and web applications (consider Apache/PHP platforms)

(e) Protected coding techniques are general guidelines that can be used to improve software safekeeping no matter what programming language is used for development. Briefly draw round some of the secure coding guidelines.

Reference no: EM13349379

Questions Cloud

Question 1broadly sort and discuss the types of safekeeping : question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer
Question 1a critically examine the scope of marketing : question 1a critically examine the scope of marketing analysis that a company needs to undertake in the development of
Question 1the government of mauritius has recently launched : question 1the government of mauritius has recently launched a new concept to give a new impetus to the tourism
Question 1in todays highly competitive business world it is : question 1in todays highly competitive business world it is needless to mention that the need for a retention plan of
Question 1a what is the disparity between encryption and : question 1a what is the disparity between encryption and hashing?b why is it not always probable to use a white
Question 1case study the retail landscape has undergone a : question 1case study the retail landscape has undergone a lot of changes in the last 15 years in mauritius. the
Question 1a there are two analysis techniques in reverse : question 1a there are two analysis techniques in reverse engineering for mobile apps static and dynamic.i set apart
Question 1the best practice approach to the development of : question 1the best practice approach to the development of a human resource strategy has severe limitations. best fit
Question 1successful service managers identify that : question 1successful service managers identify that managing demand and capacity is vital for both productive use of

Reviews

Write a Review

PHP Web Programming Questions & Answers

  Information-intensive goods and classic information goods

What is the difference between "information-intensive goods" and "classic information goods"? How can a firm that find's itself on the losing side of network effects survive?

  This sample webpages aim is to will serve most of the

this sample webpages aim is to will serve most of the audience including elder people and people with disabilities. it

  Php mysql insertion form that will insert name in customer

php mysql insertion form that will insert name in customer table and have product field that will be a dropdown menu getting product names from the product table database. When inserted it will save student name and product name in relational table. ..

  Xhtml form that collects a name

Create an XHTML form that collects a name, address, phone number, and zip code. The phone number must be input in the format of ddd-ddd-dddd and the zip code must be in the format of ddddd-dddd.

  Create a web site for an apple farm

Create a web site for an apple farm. Create an HTML5 form allowing visitors to create an account with the site. Account details are to be stored in your MySQL database. Information should be stored in a secure way.

  Design a phishing pages

An assignment to design a Phishing Pages for a popular website "Apple" Phishing pages like this first page:

  Create an xslt stylesheet that transforms the provided xml

Use the documents that are posted on share out. Many of them demonstrate very similar (or even the same) examples as what you are being ask to do for this assignment.

  Dynamic page which receive a in put

Write a program in php to generate a dynamic page which receive a in put and print it on the screen

  Create a web site for an apple farm john smith has been a

create a web site for an apple farm. john smith has been a farmer for a number of years and he has been using an

  Web application development

Create a simple Web Application that collects gradings under a number of criteria, and then calculates an aggregate mark

  Personal qualities related to online dating

Write a PHP program that presents a form to a user asking them questions about their own personal qualities related to online dating

  Which of the following jsp expressions is valid

A JSP expression can contain any Java expression that evaluates to a String object, Java object, primitive type, primitive type or Java object

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd