The code contained in the file is a web
application that enables the users to view a list of online pets for
adoption. To view the available list, users need to first register and
then log on to the application.
This week, you will familiarize yourself
with the code and begin to identify security issues. You can load the
HTML page in a browser to help explore the potential entry points of the
software. Analyze and create a report in a 2- to 3-page Microsoft Word
document addressing the following:
Create a map of the
software components and how they interact (using Microsoft Visio or
Microsoft Canvas). Include appropriate labels and interactions for the
functionality of the software and list the entry points for users to
interact with the software (these will also be the primary entry points
for an attacker).
potential ways in which attackers could compromise the software system
and what they could do with the access they gain.
Identify a preliminary set of defense measures that can be taken for this software system.