Clearly identify vulnerabilities in the code samples

Assignment Help Computer Engineering
Reference no: EM131491804 , Length: word count:2000

Programming Secure Software Systems Case Study: Safe programming issues

Related outcomes from the unit outline: 

1. Analyse the existence of vulnerabilities inherent in insecure software products

2. Assure quality by using elements of a secure framework

3. Judge the effectiveness of mitigation strategies for security vulnerabilities

Case Description: Vulnerability Detection, Analysis and Mitigation

The problem space is the File Transfer Protocol (FTP).  You will be given some code samples to evaluate.  You should:

  • Provide a short discussion (2-3 pages) of the existing vulnerabilities in the protocol.
  • Clearly identify vulnerabilities in the code samples.
  • Describe and implement (i.e., modify the code) mitigations.
  • Amend the code (without introducing new vulnerabilities) by providing commandline parameters in place of the existing interface.
  • Referring back to the first point, demonstrate that, whilst your code may be now secure, the protocol itself is still insecure.
  • Discuss and implement (if possible) a secure implementation of the protocol by adding to your code. The objective is not to write new code, but to use existing libraries.
  • Ensure that your code compiles/links with gcc and runs within the Linux environment supplied in the unit.

You must:

  • Provide a zip file containing your assignment as a Word document. The assignment should contain your code. No other compression formats accepted. No other document formats accepted.

Document Style

  • Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers.

Attachment:- Assignment Files.zip

Reference no: EM131491804

Questions Cloud

What are the major sources of the state revenue : What are the major functions of the government? What are the major sources of the federal government revenue? What are the major sources of the state revenue?
Incremental cost-effectiveness ratio comparing : According to Lee et al. (2009), the incremental cost-effectiveness ratio comparing the current dialysis treatment to the next least cost dialysis treatment.
Effect a potential company to enter the market : How can you determine what are the different barriers for each market structure and how would they effect a potential company to enter the market?
Design a simple two-company game : Design a simple two-company game that illustrates why it might have been in the economic interests of the cigarette companies to support the ban.
Clearly identify vulnerabilities in the code samples : Programming Secure Software Systems Case Study: Safe programming issues. Clearly identify vulnerabilities in the code samples
Comparative advantage and trade : Suppose there are two goods in the world, beer and chips. The world consists of four economies: Elbonia, Genovia, Kina- kuta, and Sodor.
Define a broadcast domain : What is the command line interface used for on a Cisco router?
How would you explain the finding : How would you explain the finding that people in high-income economies seem happier than people in low-income economies, but, people in high-income economies?
Why does an aggregate demand curve slope downward : Why does an aggregate demand curve slope downward? Briefly explain. How are economic fluctuations linked among national economies?

Reviews

len1491804

5/11/2017 3:40:21 AM

Australian student, total 2000 words. You should ask questions on the unit discussion board about the assignment in order to clarify ambiguities. All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide. You must include digital copies (in the zip file) of all references you cite in your assignment otherwise your assignment will not be accepted or assessed. Also include any external libraries if feasible or instructions for their installation. Separately (not in the zip file), provide the MD5 hash value of your assignment (Word) document. Submissions without a hash value will not be accepted or assessed.

len1491804

5/11/2017 3:40:15 AM

Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers. The document should include a title page and table of contents with page number one (1) starting after the table of contents. No executive summary or abstract required. The title page should not be numbered but the pages between the title page and the main body of the document should be numbered with lower case roman numerals. Any code should be 10 point Courier New, single spaced. Marks will be deducted if you do not adhere to this style.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd