java / neatbeans

XvcXvc
timer Asked: Feb 17th, 2016

Question Description

i want it done ASAP

Unformatted Attachment Preview

Demonstrating Porous Defenses Part Use NetBeans to create two different unique and complete demonstrations of Porous Defenses such as Missing Authentication for Critical Function, Missing Authorization, Use of Hard-coded Credentials, and Missing Encryption of Sensitive Data. You will demonstrate and describe how to fix each of the problems. Therefore, a total of four code samples will be created. Two with Porous Defenses and two will have the issues fixed. Assignment Details 1. Select 2 CWE/SANS Top 25 vulnerabilities under the category of Porous Defenses from one of these specific issues: a. Missing Authentication for Critical Function, b. Missing Authorization, c. Use of Hard-coded Credentials, and d. Integer Overflow or Wraparound 2. Using NetBeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should not just be a code snippet. It should be part of a small application. In other words, you need to adapt the examples provided in the documentation to something more meaningful and substantive. It doesn't have to be a large, overly complex application, but it needs to be complete, and runnable and demonstrate how this vulnerability may appear in the real world, 3. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed. 4. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in each of the two examples you created in step 2. 5. Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language. Deliverables Provide all of your source files for this assignment. Two source code files will have software vulnerabilities. The remaining two will have the issues fixed. Provide any supplemental or utility files supporting your main source files. Prepare a word or PDF file describing and demonstrating the vulnerabilities in each of your source files and specifically how you fixed the issue. You should demonstrate with screen shots and code within the document to report your findings.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Content

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors