In this week, you will continue to work on the code you modified in W2 Assignment 2.
You will reexamine the vulnerabilities of the application and modify
the code for input validation. You will also recommend cryptography and
where it should be included in the application to protect sensitive
information. Create a report in a 2- to 3-page Microsoft Word document
addressing the following:
Within the application code, implement the input validation formatting that you suggested in W2 Assignment 2.
In the report for this week, identify the functions you implemented in
application more secure against attacks.
Review the code and
information that the application records and uses. Identify information
that should be protected with cryptography. Why should this
information be protected? Is there a cryptography solution within PHP
that will address this need? If not, what type of cryptosystem should
be used to protect the information and how should it be implemented
within the application? Explain the difficulty of implementing
cryptography and why the cryptosystem must be chosen carefully for any
Note: You may implement this if you wish, but only the description of the solution is necessary for this assignment.
Using the modified code for this week, revisit your list from W1 Assignment 3 of
potential exploits and access points for the software. Identify any
new vulnerability you have discovered in the system and evaluate whether
the modifications you have made addressed these issues or whether they
are still present. List at least five potential exploits of the system
and an analysis of each.
Review the list of defense measures (that you constructed in W1 Assignment 3)
that should be implemented. Identify any new defense measure that you
feel should be included in the list. Evaluate whether the steps you
have taken to modify the application have implemented these measures
successfully. List at least five defense measures needed and an analysis