Demonstrate for each of two applications they are vulnerable

Assignment Help JAVA Programming
Reference no: EM131626253

Assignment

Demonstrating Insecure Interaction between Components

Overview

In this homework you use Netbeans to create two different unique and complete demonstrations of insecure interaction between components such as SQL Injection, Command Line Injection, Cross-Site Scripting, Unrestricted Upload of File with Dangerous Type, Cross-Site Request Forgery (CSRF), and URL Redirection to Untrusted Site ('Open Redirect'). You will demonstrate and describe how to fix each of the problems. Therefore, a total of four code samples will be created. Two will have insecure interaction between components and two will have the issues fixed.

Assignment Details

Be sure you have carefully read and understand the materials in week 1 and 2 as well as successfully configured your environment.

1. Select 2 CWE/SANS Top 25 vulnerabilities under the category of Insecure Interaction between Components. Review and try the existing examples in links in the classroom. Use Netbeans to experiment. Work in multiple languages where possible.

2. Using Netbeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should not just be a code snippet. It should be part of a small application. In other words, you need to adapt the examples provided in the documentation to something more meaningful and substantive. It doesn't have to be a large, overly complex application, but it needs to be complete, and runnable and demonstrate how this vulnerability may appear in the real world.

3. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed.

4. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in each of the two examples you created in step 2.

5. Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.

Reference no: EM131626253

Questions Cloud

Design and develop a website : COIT 20268 - Responsive Web Design (RWD) Assignment. Design and develop a website. The goal is to allow potential visitors to obtain overview of museum layout
Controllable factors to optimize the yield of process : Determine levels of controllable factors to optimize the yield of a process or minimize the variation of a response variable.
Find the macaulay duration : Find the Macaulay duration and the modified duration of a 20-year, 10% corporate bond priced to yield 8%. According to the modified duration of this bond.
Example of human technology interface : Consider an example of human technology interface in healthcare from clinical technology to administrative or electronic data.
Demonstrate for each of two applications they are vulnerable : Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of th
Keeping in mind the constraints of perfect competition : Keeping in mind the constraints of perfect competition,
What a democratice-capitalistic society : Explain what a democratice-capitalistic society is and the impact it has on the compensation practices in the US.
Calculate the net profits after taxes : Doris Wise is a young career woman. She lives in Phoenix, Arizona, where she owns and operates a highly successful modeling agency.
Choose his or her doctors with the advent of the ppaca : Explore and explain whether the patients will be able to continue with their physicians and the rationale behind the plan cancelation.

Reviews

Write a Review

JAVA Programming Questions & Answers

  Implement the link list using java programming concepts

Modify the class LinkedList by adding to it the following methods. The appropriate error message should be generated if an invalid condition occurs.

  Simulate a good old game of rock paper and scissors

You are to complete the code found in Player.java. Once completed you can then simulate a good old game of Rock, Paper, Scissors. To play you need to compile Player.java, InputMaker.java, and RockPaperScissorsTest.java.

  Create a new class called cat

Be sure your classes have a reasonable complement of constructor, accessor and mutator methods. Every member variable must have at least one independent accessor and one independent mutator

  Write a java program to store four records

You will handle student records in a file named "student_record". Each record in the file consists of student number of integer type and student name of 32 characters, so the size of each record is 36 bytes. You need to write a Java program to sto..

  Write a java program using classes and object

Use different program control statements in a programming language and demonstrate the use of arrays with a programming language and Define and work with classes and objects in a programming language.

  Create the java source code files for the classes listed in

Create an abstract base class, Animal. The single constructor requires a String to indicate the type of animal, which then is stored in an instance variable.

  Complier error and run time error

Q1. What do you understand by complier error and run time error? Explain by example.

  Java swing components and file processing

Java Swing Components and File Processing, Write a program named GuessGame.java that plays the game "guess the number" as follows. Your program chooses the number to be guessed by selecting an integer at random in the range 1-1000. The program then..

  Represent the relationship between parents - children class

Draw a class diagram that represents the relationship between parents, children, and grandparents. Take into account that a person can have both a parent and a child. Annotate associations with roles and multiplicities.

  Demonstrate the singleton pattern

Write a Java program (non-GUI preferred) to demonstrate the Singleton pattern. The key parts of the singleton pattern are: A private static variable to store the single instance called the singleton A public static method for callers to get a referen..

  Using netbeans, use repetition to display a table of values

Using Netbeans, use repetition to display a table of values showing x, the square of x and the cube of x. X is to go up to 5.

  Write an application that present user with a menu of tasks

Write an application named, Names.java, that presents the user with a menu of tasks and continues reading a user selection and performing tasks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd