Please help with this question!

Apr 12th, 2015
Sigchi4life
Category:
Computer Science
Price: $20 USD

Question description

README.txt

In this week, you will continue to work on the code you modified in W2 Assignment 2. You will reexamine the vulnerabilities of the application and modify the code for input validation. You will also recommend cryptography and where it should be included in the application to protect sensitive information. Create a report in a 2- to 3-page Microsoft Word document addressing the following:

  • Within the application code, implement the input validation formatting that you suggested in W2 Assignment 2. In the report for this week, identify the functions you implemented in JavaScript and PHP and explain how these functions have made your application more secure against attacks.
  • Review the code and information that the application records and uses. Identify information that should be protected with cryptography. Why should this information be protected? Is there a cryptography solution within PHP that will address this need? If not, what type of cryptosystem should be used to protect the information and how should it be implemented within the application? Explain the difficulty of implementing cryptography and why the cryptosystem must be chosen carefully for any application.
  • Note: You may implement this if you wish, but only the description of the solution is necessary for this assignment.

  • Using the modified code for this week, revisit your list from W1 Assignment 3 of potential exploits and access points for the software. Identify any new vulnerability you have discovered in the system and evaluate whether the modifications you have made addressed these issues or whether they are still present. List at least five potential exploits of the system and an analysis of each.
  • Review the list of defense measures (that you constructed in W1 Assignment 3) that should be implemented. Identify any new defense measure that you feel should be included in the list. Evaluate whether the steps you have taken to modify the application have implemented these measures successfully. List at least five defense measures needed and an analysis of each.


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UT Austin
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
darnay
Dec 4th, 2016
" The best tutor out there!!!! "
dontuwannaknow
Nov 25th, 2016
" Excellent work as always thanks so much "
SjSurvivor143
Nov 11th, 2016
" Thanks for the help. "
ddg82
Nov 2nd, 2016
" Thanks, good work "
tinytim47
Oct 20th, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
jestin7
Oct 11th, 2016
" This tutor is great! "
mixedballz
Oct 6th, 2016
" excellent work as always thanks for the help "
lilmoe415
Sep 27th, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1822 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors