Clearly identify vulnerabilities in the code samples

Assignment Help Computer Engineering
Reference no: EM131491804 , Length: word count:2000

Programming Secure Software Systems Case Study: Safe programming issues

Related outcomes from the unit outline: 

1. Analyse the existence of vulnerabilities inherent in insecure software products

2. Assure quality by using elements of a secure framework

3. Judge the effectiveness of mitigation strategies for security vulnerabilities

Case Description: Vulnerability Detection, Analysis and Mitigation

The problem space is the File Transfer Protocol (FTP).  You will be given some code samples to evaluate.  You should:

  • Provide a short discussion (2-3 pages) of the existing vulnerabilities in the protocol.
  • Clearly identify vulnerabilities in the code samples.
  • Describe and implement (i.e., modify the code) mitigations.
  • Amend the code (without introducing new vulnerabilities) by providing commandline parameters in place of the existing interface.
  • Referring back to the first point, demonstrate that, whilst your code may be now secure, the protocol itself is still insecure.
  • Discuss and implement (if possible) a secure implementation of the protocol by adding to your code. The objective is not to write new code, but to use existing libraries.
  • Ensure that your code compiles/links with gcc and runs within the Linux environment supplied in the unit.

You must:

  • Provide a zip file containing your assignment as a Word document. The assignment should contain your code. No other compression formats accepted. No other document formats accepted.

Document Style

  • Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers.

Attachment:- Assignment Files.zip

Reference no: EM131491804

Questions Cloud

What are the major sources of the state revenue : What are the major functions of the government? What are the major sources of the federal government revenue? What are the major sources of the state revenue?
Incremental cost-effectiveness ratio comparing : According to Lee et al. (2009), the incremental cost-effectiveness ratio comparing the current dialysis treatment to the next least cost dialysis treatment.
Effect a potential company to enter the market : How can you determine what are the different barriers for each market structure and how would they effect a potential company to enter the market?
Design a simple two-company game : Design a simple two-company game that illustrates why it might have been in the economic interests of the cigarette companies to support the ban.
Clearly identify vulnerabilities in the code samples : Programming Secure Software Systems Case Study: Safe programming issues. Clearly identify vulnerabilities in the code samples
Comparative advantage and trade : Suppose there are two goods in the world, beer and chips. The world consists of four economies: Elbonia, Genovia, Kina- kuta, and Sodor.
Define a broadcast domain : What is the command line interface used for on a Cisco router?
How would you explain the finding : How would you explain the finding that people in high-income economies seem happier than people in low-income economies, but, people in high-income economies?
Why does an aggregate demand curve slope downward : Why does an aggregate demand curve slope downward? Briefly explain. How are economic fluctuations linked among national economies?

Reviews

len1491804

5/11/2017 3:40:21 AM

Australian student, total 2000 words. You should ask questions on the unit discussion board about the assignment in order to clarify ambiguities. All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide. You must include digital copies (in the zip file) of all references you cite in your assignment otherwise your assignment will not be accepted or assessed. Also include any external libraries if feasible or instructions for their installation. Separately (not in the zip file), provide the MD5 hash value of your assignment (Word) document. Submissions without a hash value will not be accepted or assessed.

len1491804

5/11/2017 3:40:15 AM

Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers. The document should include a title page and table of contents with page number one (1) starting after the table of contents. No executive summary or abstract required. The title page should not be numbered but the pages between the title page and the main body of the document should be numbered with lower case roman numerals. Any code should be 10 point Courier New, single spaced. Marks will be deducted if you do not adhere to this style.

Write a Review

Computer Engineering Questions & Answers

  Information is data that is framed in a specific context in

information is data that is framed in a specific context. in this sense information is contextual data that has a level

  Problems on relation and functional dependencies

Problems on  relation and functional dependencies

  Embedded system what is exemplary embedded

what is exemplary embedded system

  What frustrations with computer capabilities today

What frustrations do you have with computer capabilities today.

  Show a letter grade based upon the average

In this script, convert pseudocode that uses a decision structure into a shell script. The script then will accept three grades, calculate an average, and then display a letter grade based upon the average.You will need to use either the if statem..

  The use of a cli command line interface gives flexibility

the use of a cli command line interface provides flexibility and power for the user who knows how to use the cli

  Plan and implement a stringed musical instrument class

Plan and implement a stringed musical instrument class

  Make use of method iteration to find a formula expressing

How several elementary operations are used in the following algorithm? The elementary operations are comparison operations (such as > and

  How the project manager guard against the natural tendency

It is sometimes suggested that time estimates for I.T. project work elements should be generated primarily by those involved in carrying out the work (e.g. analysts and programmers).

  Explain how a packet is encapsulated

Explain how a packet is encapsulated

  How office applications installed on a computer

List the common interface features seen in this applications versions of each of the office applications installed on a computer.

  Purpose of the open systems interconnection

explain when and why the International Standards Organization developed the OSI model.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd