国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫G6077程序、代做Python編程設(shè)計(jì)
代寫G6077程序、代做Python編程設(shè)計(jì)

時(shí)間:2024-10-31  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Introduction to Computer Security – G6077

Weighting:   50% of marks for the module 
Version Information: Oct 2024
Submission deadline: Check deadline on Sussex direct. e-submission to Canvas 

You must work on this assignment on your own. The standard Informatics rules for collusion, plagiarism and lateness apply. Any cases of potential misconduct discovered will be reported and investigated.

Part A – Virtual Private Cloud (10 marks)
Use the AWS services to implement the infrastructure given below. Once you implement this, you will need to take screen shots of your settings to provide it in the report.  


Part B (** marks)

Lovejoy’s Antique Evaluation Web Application

In this part of the coursework, you will develop a secure web application for a local antique dealer named Lovejoy.  Lovejoy wants a minimum viable product allowing customers to register and then request evaluations of potential antique objects.   Lovejoy has many rivals in the antique business who may sometimes resort to underhand tactics and so is very concerned about the security of the application.  
Your secure web application will need to have these features for the minimum viable product (MVP) release: user registration and login, a password policy, “request evaluation” page and then an extension of the “request evaluation” page file upload to allow upload of photos. Finally, Lovejoy needs a request listing page.
You should build Lovejoy’s MVP focusing on the following features in each task.  Mark allocation for each task are as described below and in the security analysis grid.  You should reflect upon your work and provide estimates of how much you’ve achieved by filling out the marking grid. An example of self-reflection is provided in the Canvas. There are thus 30 marks for completing the application reasonably, 50 marks for the security features identified and implemented, and 10 marks for self-reflection and video quality.
You have a choice of technologies from which to build the application:
PHP 
Java 
Python 
No other approach is allowed. If you are using Java and Python, you should research it yourself to find out where you want to host it.  

Task 1 - Develop a secure web form that allows customers to register in the application. They must register an email address, password, name and contact telephone number. The users’ details should be stored in a database.  
    Code Quality 5 marks
    Database Design 5 marks

Task 2 - Develop a secure login feature. 
    Code Quality 5 marks

Task 3 – Extend the password management feature to provide password strength recommendations and password recovery.
    Code Quality 5 marks

Task 4 - Implement a “Request Evaluation” web page only accessible to logged in users. This web page should have a comment box to type in the details of the object and their request, and a dropdown box for preferred method of contact between phone or email. The evaluation page should allow for file upload of a photo of the object.  
    Code Quality 5 marks

Task 5 – Implement a page that displays a list of evaluation requests.  This page should only be visible to an administrator role.    Code Quality 5 marks

Submission guidance 
You are only submitting the report to the Canvas. You must follow the report template.
Report -- You must use the report template provided at the end of this coursework description. In your report, you will provide screenshots of all the marking criteria elements and annotate where necessary. In screen shots for the code, please don’t give a big chunk of code, provide only the related lines. Use bullet points to give any explanation, please don’t write big paragraphs. 

Recording -- You will use Sussex Panopto to record a video to show the working of your application and its security features. Useful links provided at the end about Panopto. It is a very straightforward tool to use. You log in using University credential, select the right screen, and record the application to show different features. Show us the aspects that cover marking criteria. Consider the following when recording. 
1) Recording must not be more than 10 minutes. 
2) Must show the testing of all tasks in sequence (features) and its security features
3) Provide voice over or textual application on the video to explain the recording.  
4) Record screen and yourself in the video.
5) Use the self-reflection grid in the task 0 to show the order of recording features.
When you record the video, from the settings, there is a share link button, click on it and select the option that anyone at our organisation who has the link can access the video. Copy that link and put it in your report. 
How to use Panopto?
Recording presentation using Panopto

More guidance about recording the video will be provided in the Canvas. 

Code file location (OneDrive)-- Upload your code to the OneDrive and provide the code link in the report for our inspection. 
Select the folder where you have all the code, then click on the share option. In the settings, click on the pencil drop down menu and select the option can edit. Copy the link and put it in your report. 
See the recording on the Canvas how to setup this in a correct way. 





Excellent (10-9 marks)    Good (8-6 marks)    Average (5-3 marks)    Poor (2-0 marks)
     10 marks    
 Criteria (50 marks)

Excellent (15-13)    Good (12-10)    Average (9-5)    Poor (4-0)     15 marks    
Policy has no flaw, and its implementation is excellent. Various mechanisms implemented to ensure password policy is secure.      Policy has no flaws, but implementation of policy is simple.    Password policy has very few flaws. However, different sections of policy are implemented and working.      Policy has many flaws for example password is not encrypted, and no salt applied. Password forgot policy has security flaws.     Password policy          15marks
Password entropy, encrypted storage, security questions and recovery of password

Several countermeasures are implemented, and the quality of countermeasures are excellent.    Countermeasures are implemented in all the pages however quality of implementation is simple.      Implemented countermeasures only in some parts of the application. 
    Very little effort to implement countermeasures to avoid these vulnerabilities. 
    Vulnerabilities              15 marks
SQL injection, XSS, CSRF, File Upload and any other obvious vulnerability.
All the requirements are implemented to authenticate users. Implementation quality is excellent.      All requirements are implemented to authenticate the user. However, quality of implementation is simple.      Only some obvious requirements are not implemented.     Lots of obvious authentication’s requirements are not implemented.     Authentication and Encryption              10 marks 
User identity management (registration and login etc), Email verification for registration, 2 factor authentications (PIN and or email)
Encryption applied reasonably to secure assets
Excellent implementation of countermeasures against these attacks.     No flaws in countermeasures however quality of implementation is simple.      Some flaws in countermeasures     Very little effort against these attacks.     Obfuscation/Common attacks      10 marks
Brute force attack – Number of attempts
Botnet attack – Captcha 
Dictionary attack/Rainbow table attack
5 marks    5 marks    5 marks    5 marks    10 marks    30 marks
List evaluation-Task5    Request evaluation – task 4    Forgot password-Task3    Login-Task2    User registration/Database-Task1    Features of webs application

Up to 4/6 marks    0 marks    10 marks
Fairly fully completed    Marking not completed    Self-reflection – 4 marks
Covered everything in order    Missing aspects    Video quality – 6 marks

Excellent (9 to 10)    Good (6 to 8)    Average (3 to 5)    Poor (0-2)    10 marks
Everything is implemented as in the infrastructure    Very little mistakes in the implementation     Few mistakes in implementation     Very little attempt.     Virtual Private Cloud & Security groups 

Report 
You will be submitting this report to the Canvas. The report has 6 tasks. From 1 to 5, it covers the secure application part and the last task 6 covers the AWS. You will provide the three required links below.
1)Code file Location: --------------------------------------
Upload your code to OneDrive and provide a link here. Set up correct permission so that anyone with a link can view it. 
2)Panopto recording:------------------------------------------
 If you don’t provide this, we will not be able to test your work fully. 

If any of the above evidence is not provided, you will lose marks as I will not be able to test your application. 
Task 0 – Self-reflection 
Marking grid filled up by you. Fill it up and past it here. We expect you to self-assess yourself fairly. 
Marking criteria    Sub criteria    Tick/cross    Marks
 (from the main marking grid, assign fair marks to yourself)
Password policy    Password entropy                

    Security questions        
    Password recovery        
Vulnerabilites    SQL injection,         


    XSS,         
    CSRF,         
    File Upload and         
    any other obvious vulnerability.        
Authentication/Encrypted storage    User registration, User login         
    Email verification for registration,        
    2 factor authentications (PIN and or email)        
    Encrypted storage        
Obfuscation/Common attacks     Brute force attack – Number of attempts        
    Botnet attack – Captcha         
    Dictionary attack/Rainbow table attack        
Features of web application    Database design        
    User registration        
    User login        
    Forgot password        
    Evaluation        
    List evaluation        
VPC    Evidence provided        
Video    All the marking criteria covered        
Self-reflection    This marking grid fill out properly        
            Total marks = 

Task 1 – User registration 
Registration feature code screenshots

Database Table

Why do you think it is secure?  Use bullet points to provide your reasons and back it up with code snippet from your application. Don’t paste the big junks of code in the report, show us those specific lines, highlight, and annotate if you need to.

Task 2 - Develop a secure login feature. 
Login feature code screenshots

Why do you think it is secure?  Use bullet points to provide your reasons and back it up code snippet from your application.

Task 3 - Implement password strength and password recovery

List each password policy element that you implemented and back it up with code snippets from your application. 

Task 4 - Implement a “Evaluation Request” web page. 

Request Evaluation feature screenshot

Why do you think it is secure? 

Task 5 – Request Listing Page

Code of the feature

Why do you think it is secure?

Task 6 –AWS Virtual Private Cloud settings screen shots. 

請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp



 

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:RBE104TC代做、C/C++設(shè)計(jì)編程代寫
  • 下一篇:代寫CSE x25、C++/Java程序設(shè)計(jì)代做
  • 無(wú)相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路流場(chǎng)仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真技術(shù)服務(wù)
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲勞振動(dòng)
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)40個(gè)行業(yè)
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)4
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手,多多出評(píng)軟件徽y1698861
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服務(wù)平臺(tái)
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內(nèi)
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗(yàn)證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網(wǎng)頁(yè)版入口 wps 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    亚洲伊人婷婷| 欧美中文字幕第一页| 免费在线a视频| 日韩一中文字幕| 无码人妻丰满熟妇区96| 国产九九精品视频| 日本一区视频在线观看免费| 91成人福利在线| 国内精品美女av在线播放| 欧美激情精品久久久久久| 蜜桃av噜噜一区二区三| 不卡伊人av在线播放| 国产免费黄视频| 亚洲一区精品视频| 久久久久一区二区| 国产美女直播视频一区| 国产精品永久入口久久久| 美女啪啪无遮挡免费久久网站| 欧美国产激情视频| 国产精品啪视频| 国产日本在线播放| 丁香六月激情网| 欧美激情18p| 欧美一级二级三级九九九| 欧美精品二区三区四区免费看视频| 国产999视频| 久久精品国亚洲| 久久久久欧美| 成人福利视频网| 97人人模人人爽视频一区二区 | 欧美激情久久久久久| 国产精品久久激情| 日韩精品极品视频在线观看免费| 99国内精品久久久久久久软件| 国产狼人综合免费视频| 久久久久久久久久久久av| 亚洲mm色国产网站| 蜜桃传媒视频第一区入口在线看| 国内精品**久久毛片app| 国产成人一区二区三区别| 欧美在线视频观看| 日韩在线视频网| 国产伦精品一区二区三区高清 | 日韩av在线综合| 一区二区三区在线视频看| 日韩精品xxxx| 欧洲精品在线播放| 欧美在线一区二区三区四区| 久久精品国产亚洲7777| 国产精品区一区二区三含羞草 | 久久久精品动漫| 久久黄色av网站| 欧美日韩喷水| 国产免费观看久久黄| 国外色69视频在线观看| 国产精品日韩欧美大师| 国产乱码一区| 欧美影院在线播放| 国产精品久久久| 国产精品免费成人| 欧美精品性视频| 国产精品免费观看高清| 亚洲一区二区三区免费观看| 动漫3d精品一区二区三区| 国产精品久久一区| 久艹在线免费观看| 日韩中文字幕在线看| 国产高清视频一区三区| 国产成人精品国内自产拍免费看| 欧美日韩在线高清| 国产男女在线观看| 日韩欧美一级在线| 国产亚洲欧美在线视频| 国产伦精品一区二区三区在线 | 国产精品日韩欧美一区二区| 在线精品日韩| 欧美在线一二三区| 久久免费视频1| 亚洲欧洲精品一区| 国产精品亚洲精品| 91免费的视频在线播放| 黄页免费在线观看视频| 人妻无码久久一区二区三区免费 | 欧美性受xxxx黑人猛交88| 国内精品免费午夜毛片| 国产在线精品自拍| 91精品国产综合久久久久久丝袜 | 欧美久久精品午夜青青大伊人| 欧美一区二区三区图| www.com毛片| 国产精品视频区1| 91精品国产免费久久久久久| 精品一区2区三区| 久久人人爽国产| 国产精品视频入口| 日韩一区av在线| 欧美一区二区三区……| 国产主播欧美精品| 日韩中文字幕国产| 精品国产无码在线| 午夜精品一区二区三区在线视频| 亚洲丰满在线| 国产又黄又爽免费视频| 日韩中文字在线| 欧洲成人在线观看| 国产亚洲精品久久久久久久| 久久天天狠狠| 久久国产精品亚洲va麻豆| 中文字幕一区二区三区四区五区人| 99视频免费观看蜜桃视频| 97久久精品视频| 成人国产精品av| 日本久久久久久久| 国产精品美女网站| 成人av男人的天堂| 精品国产一二三四区| 欧美亚洲伦理www| 久久免费视频观看| 精品一区二区三区无码视频| 懂色一区二区三区av片| 播播国产欧美激情| 国产精品一区二区av| 日本久久久久久久| 久久免费一级片| 国产成人精品日本亚洲| 欧美自拍视频在线| 九九精品在线观看| 日韩视频一区在线| 免费国产一区| 日本不卡在线播放| 国产精品久久久久秋霞鲁丝 | 国产精品12345| 黑人中文字幕一区二区三区| 亚洲av首页在线| 久久99国产精品久久久久久久久| 国产一区在线观| 国产日韩精品入口| 欧美精品尤物在线| 欧美在线中文字幕| 色综合91久久精品中文字幕| 国产成人一区二区三区电影| 国产专区欧美专区| 极品日韩久久| 亚洲v国产v| 亚洲第一综合| 久久97精品久久久久久久不卡 | 国产精品日韩欧美一区二区三区| 91精品国产自产91精品| 久久一区二区精品| 日韩有码视频在线| 久久av.com| 日韩中文字幕在线免费| 国产免费裸体视频| 久久久亚洲国产精品| 国产精品aaa| 久久久噜噜噜久久中文字免| www.欧美黄色| 91精品视频免费观看| 91精品一区二区| 国产日韩欧美一二三区| 精品一区在线播放| 欧美一级二级三级九九九| 欧美精品在线免费播放| 国产精品黄色影片导航在线观看| 精品国产一区二区三区四区在线观看 | 欧洲熟妇精品视频| 久久久最新网址| 欧美一区2区三区4区公司二百| 欧美日韩福利电影| 欧美中日韩一区二区三区| 日韩免费av片在线观看| 狠狠色伊人亚洲综合网站色| 国产片侵犯亲女视频播放| 97久草视频| 国产精品久久久久久av下载红粉| 一区二区在线观看网站| 亚洲wwwav| 日韩中文在线字幕| 91精品国产综合久久香蕉922 | 久久精品日韩| 国产精品久久一区二区三区| 亚洲a级在线观看| 91精品国产91久久久久麻豆 主演| 免费97视频在线精品国自产拍| 日韩欧美一区三区| 国产成人亚洲精品| 精品人妻人人做人人爽| 91av中文字幕| 亚洲熟妇无码另类久久久| 日韩在线第三页| 色妞欧美日韩在线| 五月天婷亚洲天综合网鲁鲁鲁| 国内一区二区在线视频观看| 久久久综合免费视频| 中文字幕在线中文| 国产免费黄色av| 久久国产精品影片| 国内少妇毛片视频| 国产制服91一区二区三区制服| 色偷偷888欧美精品久久久|