Discuss the log file and how it could be used

Assignment Help Python Programming
Reference no: EM133463114

Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional knowledge applied using Python functionality.

Python Applications for this lab: (total 100 points):

Question 1. In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create:

a. Password update Form - This Python form allows a previously registered user to reset their password after they have successfully logged in.

b. Authentication functions - These Python functions will check the following NIST SP 800-63B criteria are met upon password update:
• Use the previous criteria for password length and complexity. (This work should already be done.)
• Compare the prospective secrets against a list that contains values known to be commonly- used, expected, or compromised (Provided as CommonPasswords.txt).
• If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret.

c. Logger - Create a log to log all failed login attempts. The Log should include date, time and IP address.

Hints:
1. Start early. This will take you longer than you think.
2. Leverage the File I/O, Flask and Data structures work previously performed in the class.
3. Use functions to enhance code reuse and modularity.
4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons.
5. Use comments to document your code
6. Test with many combinations.
7. Use pylint to verify the code style - the goal is a 10!

Question 2. Using the Decrypting Secret Messages sites found in this week's readings, decrypt the following messages.

a. - .... .. ... / ... -.. . ...- / ...-- ----- ----- / -.-. .-.. .- ...
... / .... .- ... / ... --- -- . / ... - .-. .- -. --. . / .-. . --.-
..- . ... - ... .-.-.-

b. U28gdGhpcyBpcyBiYXNlNjQuIE5vdyBJIGtub3cu
c. --- Psuwb Ysm ----
W oa gc qzsjsf. Bc cbs qcizr dcggwpzm twuifs hvwg cih.
--- Sbr Ysm ---

Provide the decoded message along with the Cipher and any other parameters you used to solve each puzzle.
Hints:
1. Use the rumkin site
2. You will need to experiment some to narrow down the possible algorithms used. Some are more obvious than others.
3. You will know when you have selected the correct Cipher

Question 3. Document your results of the application running from your programming environment. You should also include and discuss your pylint results for the application. Provide your test results for each requirement in the Web application, associated functions and provide your resulting log files. Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions and how you tested each requirement. Include the Cipher tool results and write up in this document as well.

Reference no: EM133463114

Questions Cloud

How did that experience affect other relationships : Did you see things the way they really were, or were your eyes opened to something else? Was there any bias? How did that experience affect other relationships?
Discuss anything you feel is relevant to the materials : what we have addressed-offering any key insights, interesting critiques, and observations gained from the readings. Feel free to offer any views and opinions
Create the joint network defense bulletin : Create the Joint Network Defense Bulletin. Compile the information you have gathered, taking care to eliminate any sensitive bank-specific information.
How the writing styles or choices your peer has presented : Offer ideas on how the writing styles or choices your peer has presented might be strengthened in a persuasive writing context.
Discuss the log file and how it could be used : Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions
What do we mean by a product''s country of origin : What do we mean by a product's country of origin? What determines it? Why is it important to accurately state the product's country of origin?
What are the personal and communal ethical factors : What are the personal and/or communal ethical factors that may be involved in determining the moral position of either side in that debate?
Describe a specific crisis involved a person or family : Describe a specific crisis involved a person or family. Analyze a crisis-related issue that the in individual is facing/will or may face.
Person with disability can face obstacles in society : A person with disability can face obstacles in society that are not faced by other people.

Reviews

len3463114

7/6/2023 10:45:12 PM

Score of Cipher Tools,/ 33.75 Documentation 22.5 points Document your results of the application running from your programming environment. You should also include and discuss your pylint results for the application. Provide your test results for each requirement in the Web application, associated functions and provide your resulting log files. Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of your NIST password complexity functions and how you tested each requirement. Include the Cipher tool results and write up in this document as well. Score of Documentation,/ 22.5 Total Score of Lab 8 -Grading Guidelines

len3463114

7/6/2023 10:44:49 PM

– These Python functions will check the following NIST SP 800-63B criteria are met upon password update: • Use the previous criteria for password length and complexity. (This work should already be done.) • Compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised (Provided as CommonPasswords.txt). • If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret. c. Logger – Create a log to log all failed login attempts. The Log should include date, time and IP address. Score of Web Form and Tools,/ 56.25 Cipher Tools 33.75 points Using the Decrypting Secret Messages sites found in this week’s readings, decrypt the following messages.

len3463114

7/6/2023 10:44:37 PM

Criteria Meets Criterion Score Web Form and Tools 56.25 points In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create: a. Password update Form – This Python form allows a previously registered user to reset their password after they have successfully logged in. b. Authentication functions

Write a Review

Python Programming Questions & Answers

  Write a python program to implement the diff command

Without using the system() function to call any bash commands, write a python program that will implement a simple version of the diff command.

  Write a program for checking a circle

Write a program for checking a circle program must either print "is a circle: YES" or "is a circle: NO", appropriately.

  Prepare a python program

Prepare a Python program which evaluates how many stuck numbers there are in a range of integers. The range will be input as two command-line arguments.

  Python atm program to enter account number

Write a simple Python ATM program. Ask user to enter their account number, and print their initail balance. (Just make one up). Ask them if they wish to make deposit or withdrawal.

  Python function to calculate two roots

Write a Python function main() to calculate two roots. You must input a,b and c from keyboard, and then print two roots. Suppose the discriminant D= b2-4ac is positive.

  Design program that asks user to enter amount in python

IN Python Design a program that asks the user to enter the amount that he or she has budget in a month. A loop should then prompt the user to enter his or her expenses for the month.

  Write python program which imports three dictionaries

Write a Python program called hours.py which imports three dictionaries, and uses the data in them to calculate how many hours each person has spent in the lab.

  Write python program to create factors of numbers

Write down a python program which takes two numbers and creates the factors of both numbers and displays the greatest common factor.

  Email spam filter

Analyze the emails and predict whether the mail is a spam or not a spam - Create a training file and copy the text of several mails and spams in to it And create a test set identical to the training set but with different examples.

  Improve the readability and structural design of the code

Improve the readability and structural design of the code by improving the function names, variables, and loops, as well as whitespace. Move functions close to related functions or blocks of code related to your organised code.

  Create a simple and responsive gui

Please use primarily PHP or Python to solve the exercise and create a simple and responsive GUI, using HTML, CSS and JavaScript.Do not use a database.

  The program is to print the time

The program is to print the time in seconds that the iterative version takes, the time in seconds that the recursive version takes, and the difference between the times.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd