99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫G6077程序、代做Python編程設計
代寫G6077程序、代做Python編程設計

時間:2024-10-31  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Introduction to Computer Security – G6077

Weighting:   50% of marks for the module 
Version Information: Oct 2024
Submission deadline: Check deadline on Sussex direct. e-submission to Canvas 

You must work on this assignment on your own. The standard Informatics rules for collusion, plagiarism and lateness apply. Any cases of potential misconduct discovered will be reported and investigated.

Part A – Virtual Private Cloud (10 marks)
Use the AWS services to implement the infrastructure given below. Once you implement this, you will need to take screen shots of your settings to provide it in the report.  


Part B (** marks)

Lovejoy’s Antique Evaluation Web Application

In this part of the coursework, you will develop a secure web application for a local antique dealer named Lovejoy.  Lovejoy wants a minimum viable product allowing customers to register and then request evaluations of potential antique objects.   Lovejoy has many rivals in the antique business who may sometimes resort to underhand tactics and so is very concerned about the security of the application.  
Your secure web application will need to have these features for the minimum viable product (MVP) release: user registration and login, a password policy, “request evaluation” page and then an extension of the “request evaluation” page file upload to allow upload of photos. Finally, Lovejoy needs a request listing page.
You should build Lovejoy’s MVP focusing on the following features in each task.  Mark allocation for each task are as described below and in the security analysis grid.  You should reflect upon your work and provide estimates of how much you’ve achieved by filling out the marking grid. An example of self-reflection is provided in the Canvas. There are thus 30 marks for completing the application reasonably, 50 marks for the security features identified and implemented, and 10 marks for self-reflection and video quality.
You have a choice of technologies from which to build the application:
PHP 
Java 
Python 
No other approach is allowed. If you are using Java and Python, you should research it yourself to find out where you want to host it.  

Task 1 - Develop a secure web form that allows customers to register in the application. They must register an email address, password, name and contact telephone number. The users’ details should be stored in a database.  
    Code Quality 5 marks
    Database Design 5 marks

Task 2 - Develop a secure login feature. 
    Code Quality 5 marks

Task 3 – Extend the password management feature to provide password strength recommendations and password recovery.
    Code Quality 5 marks

Task 4 - Implement a “Request Evaluation” web page only accessible to logged in users. This web page should have a comment box to type in the details of the object and their request, and a dropdown box for preferred method of contact between phone or email. The evaluation page should allow for file upload of a photo of the object.  
    Code Quality 5 marks

Task 5 – Implement a page that displays a list of evaluation requests.  This page should only be visible to an administrator role.    Code Quality 5 marks

Submission guidance 
You are only submitting the report to the Canvas. You must follow the report template.
Report -- You must use the report template provided at the end of this coursework description. In your report, you will provide screenshots of all the marking criteria elements and annotate where necessary. In screen shots for the code, please don’t give a big chunk of code, provide only the related lines. Use bullet points to give any explanation, please don’t write big paragraphs. 

Recording -- You will use Sussex Panopto to record a video to show the working of your application and its security features. Useful links provided at the end about Panopto. It is a very straightforward tool to use. You log in using University credential, select the right screen, and record the application to show different features. Show us the aspects that cover marking criteria. Consider the following when recording. 
1) Recording must not be more than 10 minutes. 
2) Must show the testing of all tasks in sequence (features) and its security features
3) Provide voice over or textual application on the video to explain the recording.  
4) Record screen and yourself in the video.
5) Use the self-reflection grid in the task 0 to show the order of recording features.
When you record the video, from the settings, there is a share link button, click on it and select the option that anyone at our organisation who has the link can access the video. Copy that link and put it in your report. 
How to use Panopto?
Recording presentation using Panopto

More guidance about recording the video will be provided in the Canvas. 

Code file location (OneDrive)-- Upload your code to the OneDrive and provide the code link in the report for our inspection. 
Select the folder where you have all the code, then click on the share option. In the settings, click on the pencil drop down menu and select the option can edit. Copy the link and put it in your report. 
See the recording on the Canvas how to setup this in a correct way. 





Excellent (10-9 marks)    Good (8-6 marks)    Average (5-3 marks)    Poor (2-0 marks)
     10 marks    
 Criteria (50 marks)

Excellent (15-13)    Good (12-10)    Average (9-5)    Poor (4-0)     15 marks    
Policy has no flaw, and its implementation is excellent. Various mechanisms implemented to ensure password policy is secure.      Policy has no flaws, but implementation of policy is simple.    Password policy has very few flaws. However, different sections of policy are implemented and working.      Policy has many flaws for example password is not encrypted, and no salt applied. Password forgot policy has security flaws.     Password policy          15marks
Password entropy, encrypted storage, security questions and recovery of password

Several countermeasures are implemented, and the quality of countermeasures are excellent.    Countermeasures are implemented in all the pages however quality of implementation is simple.      Implemented countermeasures only in some parts of the application. 
    Very little effort to implement countermeasures to avoid these vulnerabilities. 
    Vulnerabilities              15 marks
SQL injection, XSS, CSRF, File Upload and any other obvious vulnerability.
All the requirements are implemented to authenticate users. Implementation quality is excellent.      All requirements are implemented to authenticate the user. However, quality of implementation is simple.      Only some obvious requirements are not implemented.     Lots of obvious authentication’s requirements are not implemented.     Authentication and Encryption              10 marks 
User identity management (registration and login etc), Email verification for registration, 2 factor authentications (PIN and or email)
Encryption applied reasonably to secure assets
Excellent implementation of countermeasures against these attacks.     No flaws in countermeasures however quality of implementation is simple.      Some flaws in countermeasures     Very little effort against these attacks.     Obfuscation/Common attacks      10 marks
Brute force attack – Number of attempts
Botnet attack – Captcha 
Dictionary attack/Rainbow table attack
5 marks    5 marks    5 marks    5 marks    10 marks    30 marks
List evaluation-Task5    Request evaluation – task 4    Forgot password-Task3    Login-Task2    User registration/Database-Task1    Features of webs application

Up to 4/6 marks    0 marks    10 marks
Fairly fully completed    Marking not completed    Self-reflection – 4 marks
Covered everything in order    Missing aspects    Video quality – 6 marks

Excellent (9 to 10)    Good (6 to 8)    Average (3 to 5)    Poor (0-2)    10 marks
Everything is implemented as in the infrastructure    Very little mistakes in the implementation     Few mistakes in implementation     Very little attempt.     Virtual Private Cloud & Security groups 

Report 
You will be submitting this report to the Canvas. The report has 6 tasks. From 1 to 5, it covers the secure application part and the last task 6 covers the AWS. You will provide the three required links below.
1)Code file Location: --------------------------------------
Upload your code to OneDrive and provide a link here. Set up correct permission so that anyone with a link can view it. 
2)Panopto recording:------------------------------------------
 If you don’t provide this, we will not be able to test your work fully. 

If any of the above evidence is not provided, you will lose marks as I will not be able to test your application. 
Task 0 – Self-reflection 
Marking grid filled up by you. Fill it up and past it here. We expect you to self-assess yourself fairly. 
Marking criteria    Sub criteria    Tick/cross    Marks
 (from the main marking grid, assign fair marks to yourself)
Password policy    Password entropy                

    Security questions        
    Password recovery        
Vulnerabilites    SQL injection,         


    XSS,         
    CSRF,         
    File Upload and         
    any other obvious vulnerability.        
Authentication/Encrypted storage    User registration, User login         
    Email verification for registration,        
    2 factor authentications (PIN and or email)        
    Encrypted storage        
Obfuscation/Common attacks     Brute force attack – Number of attempts        
    Botnet attack – Captcha         
    Dictionary attack/Rainbow table attack        
Features of web application    Database design        
    User registration        
    User login        
    Forgot password        
    Evaluation        
    List evaluation        
VPC    Evidence provided        
Video    All the marking criteria covered        
Self-reflection    This marking grid fill out properly        
            Total marks = 

Task 1 – User registration 
Registration feature code screenshots

Database Table

Why do you think it is secure?  Use bullet points to provide your reasons and back it up with code snippet from your application. Don’t paste the big junks of code in the report, show us those specific lines, highlight, and annotate if you need to.

Task 2 - Develop a secure login feature. 
Login feature code screenshots

Why do you think it is secure?  Use bullet points to provide your reasons and back it up code snippet from your application.

Task 3 - Implement password strength and password recovery

List each password policy element that you implemented and back it up with code snippets from your application. 

Task 4 - Implement a “Evaluation Request” web page. 

Request Evaluation feature screenshot

Why do you think it is secure? 

Task 5 – Request Listing Page

Code of the feature

Why do you think it is secure?

Task 6 –AWS Virtual Private Cloud settings screen shots. 

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp



 

掃一掃在手機打開當前頁
  • 上一篇:RBE104TC代做、C/C++設計編程代寫
  • 下一篇:代寫CSE x25、C++/Java程序設計代做
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                欧美精品丝袜久久久中文字幕| 91精品啪在线观看国产60岁| 日韩一区二区免费高清| 一区二区三区美女| 欧美视频中文一区二区三区在线观看| 亚洲黄网站在线观看| 色综合中文字幕| 午夜激情久久久| 欧美一区二区久久久| 国产精品一区二区黑丝| 亚洲人成网站色在线观看| 欧美日韩久久久一区| 麻豆成人免费电影| 国产欧美一区二区精品仙草咪| 色婷婷综合久久久中文字幕| 日本中文在线一区| 亚洲欧洲精品一区二区三区| 欧美精品亚洲一区二区在线播放| 国产酒店精品激情| 亚洲综合久久久久| 国产日韩欧美高清| 欧美一区二区三区的| 99国产欧美另类久久久精品| 蜜臀av一区二区在线观看| 亚洲日本在线视频观看| 26uuu欧美日本| 欧美久久久久中文字幕| 91女厕偷拍女厕偷拍高清| 国内精品久久久久影院一蜜桃| 欧美一区二区精品在线| 亚洲欧洲综合另类| 日韩欧美中文字幕公布| 91麻豆成人久久精品二区三区| 激情图区综合网| 亚洲国产精品久久一线不卡| 国产日韩一级二级三级| 91精品国产综合久久国产大片| 91免费小视频| 95精品视频在线| 国产乱子伦一区二区三区国色天香| 亚洲成年人影院| 樱桃视频在线观看一区| 国产精品无圣光一区二区| 日韩片之四级片| 欧美视频一二三区| 91麻豆免费观看| 99久久免费国产| 成人午夜私人影院| 国产真实精品久久二三区| 奇米777欧美一区二区| 亚洲小少妇裸体bbw| 成人欧美一区二区三区白人| 国产精品全国免费观看高清| 国产蜜臀av在线一区二区三区| www成人在线观看| 久久综合九色综合97_久久久| 欧美喷水一区二区| 99精品国产99久久久久久白柏| 成人动漫一区二区在线| 国产成人av一区二区三区在线 | 国产成人自拍高清视频在线免费播放| 精品一区精品二区高清| 国产精品一区二区久激情瑜伽| 岛国一区二区在线观看| 97成人超碰视| 欧美日韩在线三区| 精品国产第一区二区三区观看体验| 精品国产露脸精彩对白| 国产精品毛片高清在线完整版| 亚洲日本在线a| 午夜激情久久久| 国产一区二区三区免费在线观看| 处破女av一区二区| 欧美中文字幕一区二区三区亚洲| 欧美日韩精品系列| 久久网这里都是精品| 最新高清无码专区| 午夜欧美一区二区三区在线播放| 久久99国产乱子伦精品免费| 99久久777色| 欧美xxxxxxxxx| 亚洲美女区一区| 久久成人麻豆午夜电影| 91视视频在线观看入口直接观看www| 欧美精品乱码久久久久久按摩| 精品国产欧美一区二区| 亚洲一区二区视频在线| 国产一区二区三区久久悠悠色av| 日本高清无吗v一区| 日韩一区二区三| 亚洲伊人伊色伊影伊综合网| 毛片基地黄久久久久久天堂| 99re视频精品| 日本一二三不卡| 久久精品国产久精国产爱| 在线观看视频一区二区欧美日韩| 久久男人中文字幕资源站| 亚洲福利一二三区| 成人av网站在线| 久久久无码精品亚洲日韩按摩| 午夜视频一区在线观看| 91年精品国产| 国产精品久久久久桃色tv| 久久99久久久欧美国产| 欧美视频在线播放| 一区二区三区小说| www.99精品| 中文字幕乱码日本亚洲一区二区| 日韩av中文在线观看| 日本大香伊一区二区三区| 中文字幕精品三区| 国产成人免费在线视频| 久久老女人爱爱| 国产制服丝袜一区| 日韩欧美电影一区| 免费在线一区观看| 日韩一区二区免费视频| 免费高清成人在线| 91精品一区二区三区久久久久久| 午夜精品久久久久久久久久久 | 一区二区三区在线免费播放| 福利一区在线观看| 久久综合999| 成人看片黄a免费看在线| 久久久综合精品| 国内精品久久久久影院薰衣草| 日韩精品一区二区三区四区| 麻豆国产精品一区二区三区| 欧美xxxx在线观看| 国产在线视视频有精品| 久久人人爽爽爽人久久久| 国产成人欧美日韩在线电影| 国产精品视频第一区| 91麻豆.com| 亚洲大片在线观看| 91精品国产综合久久国产大片| 麻豆精品精品国产自在97香蕉| 欧美电视剧免费观看| 国产精品88av| 国产精品人成在线观看免费 | 精品国产一区二区在线观看| 狠狠色丁香婷婷综合| 欧美极品aⅴ影院| 91女人视频在线观看| 亚洲综合久久av| 欧美大片日本大片免费观看| 国产自产v一区二区三区c| 国产精品毛片a∨一区二区三区| 99综合电影在线视频| 亚洲国产另类精品专区| 日韩女优视频免费观看| 成人av影院在线| 婷婷久久综合九色综合绿巨人| 日韩亚洲欧美高清| 丁香桃色午夜亚洲一区二区三区| 亚洲一区二区美女| 精品三级在线观看| 成人精品高清在线| 午夜精品123| 亚洲国产精品ⅴa在线观看| 欧美日韩一区小说| 国产在线观看一区二区| 亚洲精品国产第一综合99久久| 制服丝袜亚洲播放| 成人国产亚洲欧美成人综合网| 亚洲女同ⅹxx女同tv| 欧美大白屁股肥臀xxxxxx| 国产盗摄视频一区二区三区| 成人性生交大合| 免费人成精品欧美精品| 国产精品国产自产拍高清av王其| 欧美日韩高清影院| 大胆亚洲人体视频| 激情综合一区二区三区| 亚洲欧洲av一区二区三区久久| 欧美一级高清片在线观看| 色诱视频网站一区| 国产高清在线精品| 日韩成人一区二区| 一区二区不卡在线播放| 中文字幕不卡三区| 精品成人一区二区三区四区| 欧美视频你懂的| 91网址在线看| 国产麻豆91精品| 久久91精品久久久久久秒播| 亚洲一区二区三区四区五区黄 | 国产成人h网站| 裸体一区二区三区| 午夜视频一区二区三区| 亚洲激情综合网| 国产精品久久看| 久久久欧美精品sm网站| 久久午夜羞羞影院免费观看| 欧美一区二区福利视频| 欧美日韩二区三区| 欧美另类z0zxhd电影| 欧美日韩精品一区二区三区蜜桃| 在线一区二区三区四区五区| 91同城在线观看|