answer accuratly. thankss :) a tutor really good in biology and civics.
User Generated
whyvrjnfuvatgba
Science
Description
biology extra credit.PNG if $2 seems too little, just please do it, and you will still get more later, because i will actualy be refilling my acc later on today. thankss:)
Unformatted Attachment Preview
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
8 pages
ENV350 Ashford Week 1 Conservation Biology Elephants Lab Report
Be sure to read the general instructions from the Lessons portion of Remember, you are to upload this packet with your qui ...
ENV350 Ashford Week 1 Conservation Biology Elephants Lab Report
Be sure to read the general instructions from the Lessons portion of Remember, you are to upload this packet with your quiz for the
CS 305 SNHU Artemis Financial Vulnerability Assessment Report
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 SNHU Artemis Financial Vulnerability Assessment Report
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.” You have been promoted to the newly formed agile scrum team for Global Rain.At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.Artemis Financial desires to modernize its operations and, as a crucial part of the success of its custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a RESTful web application programming interface (API) and is seeking Global Rain’s expertise in taking steps to protect the organization from external threats.As part of the team, you are tasked with examining Artemis Financial’s web-based software application to identify any security vulnerabilities in their current software. Your assessment will be used to complete a vulnerability assessment report for mitigating the security vulnerabilities that you identify.DirectionsYou are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:What is the value of secure communications to the company?Are there any international transactions that the company produces?Are there governmental restrictions about secure communications to consider?What external threats might be present now and in the immediate future?What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:The names or vulnerability codes of the known vulnerabilitiesA brief description and recommended solutions provided by the dependency check reportAttribution (if any) that documents how this vulnerability has been identified or documented previouslyMitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.*Please note: You do not need to fix these vulnerabilities in this project.What to SubmitTo complete this project, you must submit the following:Vulnerability Assessment ReportDeliver a completed Vulnerability Assessment Report using the template provided. Follow the instructions in the template to ensure all items are met.Supporting MaterialsThe following resource(s) may help support your work on the project:Diagram: Vulnerability Assessment Process Flow DiagramReference this process flow diagram throughout the project to determine which of the seven areas of security to assess for Artemis Financial’s software application. A text version of this diagram is available: Vulnerability Assessment Process Flow Diagram Text Version.Java Software Application: CS 305 Project One Code Base.zipOpen a new Java project in Eclipse and upload this zipped file folder. This folder contains the code for the web application from Artemis Financial, with security vulnerabilities for you to identify using the guidelines provided.Website: Secure Coding Guidelines for Java SEIn this project, you will be examining Java code for security vulnerabilities. The “secure coding guidelines for Java SE” website provides an up-to-date list of common Java security concerns. The site also provides examples of Java code to examine and possible Java code solutions.Website: OWASP Secure Coding Practices Quick Reference GuideIn this project, you will be examining Java code for security vulnerabilities. The OWASP website provides an up-to-date list of common web application security concerns. The site also provides examples of using the dependency check tool to test Java code for security issues with Java project library dependencies.Textbook: Iron-Clad Java: Building Secure Web Applications, Chapters 1, 3, 7, and 10Chapter 1 of the textbook provides a basic security foundation in the context of web applications. Chapter 3 explains the benefits and common practices for access control. Chapter 7 explains the common attack of SQL injection. Chapter 10 provides a foundation for security testing and security in the development process.Tutorial: Integrating the Maven Dependency Check Plug-inFollow the instructions in this tutorial to learn how to integrate the dependency check plug-in into Maven. You will need to edit the pom.xml file to add the dependency check plug-in to Artemis Financial’s software application. When you compile your code, Eclipse will run the Maven plug-in.
6 pages
In Class Yellowstone
This worksheet complements the short video “Liz Hadly Tracks the Impact of Climate Change in 1. Prior to watching the fi ...
In Class Yellowstone
This worksheet complements the short video “Liz Hadly Tracks the Impact of Climate Change in 1. Prior to watching the film, read the questions below ...
Static Electricity and Electrostatics Lab
In this assignment, you will complete a lab on Static Electricity and Electrostatics. When you are finished, download the ...
Static Electricity and Electrostatics Lab
In this assignment, you will complete a lab on Static Electricity and Electrostatics. When you are finished, download the PDF report and submit it using the Submit Assignment button.
Similar Content
SFTY 320 ERAU Human Factors in Aviation Safety Discussion
Go to the NTSB website on Aviation Accident Reports (https://www.ntsb.gov/investigations/AccidentReport...) and select one...
Westchester Community College Average Velocity vs Total Time Elapsed Lab Report
https://youtu.be/raiFrxbHxV0...
Colorado State University Buoyancy and Density Activity Worksheet
You should to do a stimulation and answer the question for the biophysics lab it not long just few questions https://phet....
Physics Homework question 29 (2)
Two thin-walled concentric conducting spheres of radii 5.0 cm and 10 cm have a potential difference of 100 V between them....
BIOL 1000 NHCC Protein Standard Curve Worksheet
BIOL 1000 Life Science
Protein Standard Curve
Name:
Date:
Fill out this worksheet as you watch the video Standard Curve ...
answer the science questions please?
Answer the Physical Science questions please? Multiple choses , true and false, and fill in the blank........................
Physics Homework 2 1
1. The Solar Stirling Engine (conceived by Dish Stirling) was a promising example of CSP. Being an example of a CSP, the s...
Rough Draft Template 3
This study tests the water quality of tap water and two different bottled waters which were Fiji and Dasani. The methods u...
Biology Lab.studypool
3e. How would nourishment be taken into the body and be circulated? (1 point) Nematodes have a complete digestive tube, he...
Related Tags
Book Guides
Fast Food Nation
by Eric Schlosser
The President is Missing
by James Patterson, Bill Clinton
Crippled America
by Donald J Trump
The Trial
by Franz Kafka
All Quiet on the Western Front
by Erich Maria Remarque
The Bell Jar
by Sylvia Plath
The Good Earth
by Pearl S. Buck
My Brilliant Friend
by Elena Ferrante
The Age of Innocence
by Edith Wharton
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
8 pages
ENV350 Ashford Week 1 Conservation Biology Elephants Lab Report
Be sure to read the general instructions from the Lessons portion of Remember, you are to upload this packet with your qui ...
ENV350 Ashford Week 1 Conservation Biology Elephants Lab Report
Be sure to read the general instructions from the Lessons portion of Remember, you are to upload this packet with your quiz for the
CS 305 SNHU Artemis Financial Vulnerability Assessment Report
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 SNHU Artemis Financial Vulnerability Assessment Report
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.” You have been promoted to the newly formed agile scrum team for Global Rain.At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.Artemis Financial desires to modernize its operations and, as a crucial part of the success of its custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a RESTful web application programming interface (API) and is seeking Global Rain’s expertise in taking steps to protect the organization from external threats.As part of the team, you are tasked with examining Artemis Financial’s web-based software application to identify any security vulnerabilities in their current software. Your assessment will be used to complete a vulnerability assessment report for mitigating the security vulnerabilities that you identify.DirectionsYou are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:What is the value of secure communications to the company?Are there any international transactions that the company produces?Are there governmental restrictions about secure communications to consider?What external threats might be present now and in the immediate future?What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:The names or vulnerability codes of the known vulnerabilitiesA brief description and recommended solutions provided by the dependency check reportAttribution (if any) that documents how this vulnerability has been identified or documented previouslyMitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.*Please note: You do not need to fix these vulnerabilities in this project.What to SubmitTo complete this project, you must submit the following:Vulnerability Assessment ReportDeliver a completed Vulnerability Assessment Report using the template provided. Follow the instructions in the template to ensure all items are met.Supporting MaterialsThe following resource(s) may help support your work on the project:Diagram: Vulnerability Assessment Process Flow DiagramReference this process flow diagram throughout the project to determine which of the seven areas of security to assess for Artemis Financial’s software application. A text version of this diagram is available: Vulnerability Assessment Process Flow Diagram Text Version.Java Software Application: CS 305 Project One Code Base.zipOpen a new Java project in Eclipse and upload this zipped file folder. This folder contains the code for the web application from Artemis Financial, with security vulnerabilities for you to identify using the guidelines provided.Website: Secure Coding Guidelines for Java SEIn this project, you will be examining Java code for security vulnerabilities. The “secure coding guidelines for Java SE” website provides an up-to-date list of common Java security concerns. The site also provides examples of Java code to examine and possible Java code solutions.Website: OWASP Secure Coding Practices Quick Reference GuideIn this project, you will be examining Java code for security vulnerabilities. The OWASP website provides an up-to-date list of common web application security concerns. The site also provides examples of using the dependency check tool to test Java code for security issues with Java project library dependencies.Textbook: Iron-Clad Java: Building Secure Web Applications, Chapters 1, 3, 7, and 10Chapter 1 of the textbook provides a basic security foundation in the context of web applications. Chapter 3 explains the benefits and common practices for access control. Chapter 7 explains the common attack of SQL injection. Chapter 10 provides a foundation for security testing and security in the development process.Tutorial: Integrating the Maven Dependency Check Plug-inFollow the instructions in this tutorial to learn how to integrate the dependency check plug-in into Maven. You will need to edit the pom.xml file to add the dependency check plug-in to Artemis Financial’s software application. When you compile your code, Eclipse will run the Maven plug-in.
6 pages
In Class Yellowstone
This worksheet complements the short video “Liz Hadly Tracks the Impact of Climate Change in 1. Prior to watching the fi ...
In Class Yellowstone
This worksheet complements the short video “Liz Hadly Tracks the Impact of Climate Change in 1. Prior to watching the film, read the questions below ...
Static Electricity and Electrostatics Lab
In this assignment, you will complete a lab on Static Electricity and Electrostatics. When you are finished, download the ...
Static Electricity and Electrostatics Lab
In this assignment, you will complete a lab on Static Electricity and Electrostatics. When you are finished, download the PDF report and submit it using the Submit Assignment button.
Earn money selling
your Study Documents