Please help with this question!

Apr 12th, 2015
Computer Science
Price: $20 USD

Question description


In this week, you will continue to work on the code you modified in W2 Assignment 2. You will reexamine the vulnerabilities of the application and modify the code for input validation. You will also recommend cryptography and where it should be included in the application to protect sensitive information. Create a report in a 2- to 3-page Microsoft Word document addressing the following:

  • Within the application code, implement the input validation formatting that you suggested in W2 Assignment 2. In the report for this week, identify the functions you implemented in JavaScript and PHP and explain how these functions have made your application more secure against attacks.
  • Review the code and information that the application records and uses. Identify information that should be protected with cryptography. Why should this information be protected? Is there a cryptography solution within PHP that will address this need? If not, what type of cryptosystem should be used to protect the information and how should it be implemented within the application? Explain the difficulty of implementing cryptography and why the cryptosystem must be chosen carefully for any application.
  • Note: You may implement this if you wish, but only the description of the solution is necessary for this assignment.

  • Using the modified code for this week, revisit your list from W1 Assignment 3 of potential exploits and access points for the software. Identify any new vulnerability you have discovered in the system and evaluate whether the modifications you have made addressed these issues or whether they are still present. List at least five potential exploits of the system and an analysis of each.
  • Review the list of defense measures (that you constructed in W1 Assignment 3) that should be implemented. Identify any new defense measure that you feel should be included in the list. Evaluate whether the steps you have taken to modify the application have implemented these measures successfully. List at least five defense measures needed and an analysis of each.

Tutor Answer

(Top Tutor) Daniel C.
School: UT Austin

Studypool has helped 1,244,100 students

Review from our student for this Answer

Apr 19th, 2015
"awesome work thanks"
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1825 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors