99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫G6077程序、代做Python編程設計
代寫G6077程序、代做Python編程設計

時間:2024-10-31  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Introduction to Computer Security – G6077

Weighting:   50% of marks for the module 
Version Information: Oct 2024
Submission deadline: Check deadline on Sussex direct. e-submission to Canvas 

You must work on this assignment on your own. The standard Informatics rules for collusion, plagiarism and lateness apply. Any cases of potential misconduct discovered will be reported and investigated.

Part A – Virtual Private Cloud (10 marks)
Use the AWS services to implement the infrastructure given below. Once you implement this, you will need to take screen shots of your settings to provide it in the report.  


Part B (** marks)

Lovejoy’s Antique Evaluation Web Application

In this part of the coursework, you will develop a secure web application for a local antique dealer named Lovejoy.  Lovejoy wants a minimum viable product allowing customers to register and then request evaluations of potential antique objects.   Lovejoy has many rivals in the antique business who may sometimes resort to underhand tactics and so is very concerned about the security of the application.  
Your secure web application will need to have these features for the minimum viable product (MVP) release: user registration and login, a password policy, “request evaluation” page and then an extension of the “request evaluation” page file upload to allow upload of photos. Finally, Lovejoy needs a request listing page.
You should build Lovejoy’s MVP focusing on the following features in each task.  Mark allocation for each task are as described below and in the security analysis grid.  You should reflect upon your work and provide estimates of how much you’ve achieved by filling out the marking grid. An example of self-reflection is provided in the Canvas. There are thus 30 marks for completing the application reasonably, 50 marks for the security features identified and implemented, and 10 marks for self-reflection and video quality.
You have a choice of technologies from which to build the application:
PHP 
Java 
Python 
No other approach is allowed. If you are using Java and Python, you should research it yourself to find out where you want to host it.  

Task 1 - Develop a secure web form that allows customers to register in the application. They must register an email address, password, name and contact telephone number. The users’ details should be stored in a database.  
    Code Quality 5 marks
    Database Design 5 marks

Task 2 - Develop a secure login feature. 
    Code Quality 5 marks

Task 3 – Extend the password management feature to provide password strength recommendations and password recovery.
    Code Quality 5 marks

Task 4 - Implement a “Request Evaluation” web page only accessible to logged in users. This web page should have a comment box to type in the details of the object and their request, and a dropdown box for preferred method of contact between phone or email. The evaluation page should allow for file upload of a photo of the object.  
    Code Quality 5 marks

Task 5 – Implement a page that displays a list of evaluation requests.  This page should only be visible to an administrator role.    Code Quality 5 marks

Submission guidance 
You are only submitting the report to the Canvas. You must follow the report template.
Report -- You must use the report template provided at the end of this coursework description. In your report, you will provide screenshots of all the marking criteria elements and annotate where necessary. In screen shots for the code, please don’t give a big chunk of code, provide only the related lines. Use bullet points to give any explanation, please don’t write big paragraphs. 

Recording -- You will use Sussex Panopto to record a video to show the working of your application and its security features. Useful links provided at the end about Panopto. It is a very straightforward tool to use. You log in using University credential, select the right screen, and record the application to show different features. Show us the aspects that cover marking criteria. Consider the following when recording. 
1) Recording must not be more than 10 minutes. 
2) Must show the testing of all tasks in sequence (features) and its security features
3) Provide voice over or textual application on the video to explain the recording.  
4) Record screen and yourself in the video.
5) Use the self-reflection grid in the task 0 to show the order of recording features.
When you record the video, from the settings, there is a share link button, click on it and select the option that anyone at our organisation who has the link can access the video. Copy that link and put it in your report. 
How to use Panopto?
Recording presentation using Panopto

More guidance about recording the video will be provided in the Canvas. 

Code file location (OneDrive)-- Upload your code to the OneDrive and provide the code link in the report for our inspection. 
Select the folder where you have all the code, then click on the share option. In the settings, click on the pencil drop down menu and select the option can edit. Copy the link and put it in your report. 
See the recording on the Canvas how to setup this in a correct way. 





Excellent (10-9 marks)    Good (8-6 marks)    Average (5-3 marks)    Poor (2-0 marks)
     10 marks    
 Criteria (50 marks)

Excellent (15-13)    Good (12-10)    Average (9-5)    Poor (4-0)     15 marks    
Policy has no flaw, and its implementation is excellent. Various mechanisms implemented to ensure password policy is secure.      Policy has no flaws, but implementation of policy is simple.    Password policy has very few flaws. However, different sections of policy are implemented and working.      Policy has many flaws for example password is not encrypted, and no salt applied. Password forgot policy has security flaws.     Password policy          15marks
Password entropy, encrypted storage, security questions and recovery of password

Several countermeasures are implemented, and the quality of countermeasures are excellent.    Countermeasures are implemented in all the pages however quality of implementation is simple.      Implemented countermeasures only in some parts of the application. 
    Very little effort to implement countermeasures to avoid these vulnerabilities. 
    Vulnerabilities              15 marks
SQL injection, XSS, CSRF, File Upload and any other obvious vulnerability.
All the requirements are implemented to authenticate users. Implementation quality is excellent.      All requirements are implemented to authenticate the user. However, quality of implementation is simple.      Only some obvious requirements are not implemented.     Lots of obvious authentication’s requirements are not implemented.     Authentication and Encryption              10 marks 
User identity management (registration and login etc), Email verification for registration, 2 factor authentications (PIN and or email)
Encryption applied reasonably to secure assets
Excellent implementation of countermeasures against these attacks.     No flaws in countermeasures however quality of implementation is simple.      Some flaws in countermeasures     Very little effort against these attacks.     Obfuscation/Common attacks      10 marks
Brute force attack – Number of attempts
Botnet attack – Captcha 
Dictionary attack/Rainbow table attack
5 marks    5 marks    5 marks    5 marks    10 marks    30 marks
List evaluation-Task5    Request evaluation – task 4    Forgot password-Task3    Login-Task2    User registration/Database-Task1    Features of webs application

Up to 4/6 marks    0 marks    10 marks
Fairly fully completed    Marking not completed    Self-reflection – 4 marks
Covered everything in order    Missing aspects    Video quality – 6 marks

Excellent (9 to 10)    Good (6 to 8)    Average (3 to 5)    Poor (0-2)    10 marks
Everything is implemented as in the infrastructure    Very little mistakes in the implementation     Few mistakes in implementation     Very little attempt.     Virtual Private Cloud & Security groups 

Report 
You will be submitting this report to the Canvas. The report has 6 tasks. From 1 to 5, it covers the secure application part and the last task 6 covers the AWS. You will provide the three required links below.
1)Code file Location: --------------------------------------
Upload your code to OneDrive and provide a link here. Set up correct permission so that anyone with a link can view it. 
2)Panopto recording:------------------------------------------
 If you don’t provide this, we will not be able to test your work fully. 

If any of the above evidence is not provided, you will lose marks as I will not be able to test your application. 
Task 0 – Self-reflection 
Marking grid filled up by you. Fill it up and past it here. We expect you to self-assess yourself fairly. 
Marking criteria    Sub criteria    Tick/cross    Marks
 (from the main marking grid, assign fair marks to yourself)
Password policy    Password entropy                

    Security questions        
    Password recovery        
Vulnerabilites    SQL injection,         


    XSS,         
    CSRF,         
    File Upload and         
    any other obvious vulnerability.        
Authentication/Encrypted storage    User registration, User login         
    Email verification for registration,        
    2 factor authentications (PIN and or email)        
    Encrypted storage        
Obfuscation/Common attacks     Brute force attack – Number of attempts        
    Botnet attack – Captcha         
    Dictionary attack/Rainbow table attack        
Features of web application    Database design        
    User registration        
    User login        
    Forgot password        
    Evaluation        
    List evaluation        
VPC    Evidence provided        
Video    All the marking criteria covered        
Self-reflection    This marking grid fill out properly        
            Total marks = 

Task 1 – User registration 
Registration feature code screenshots

Database Table

Why do you think it is secure?  Use bullet points to provide your reasons and back it up with code snippet from your application. Don’t paste the big junks of code in the report, show us those specific lines, highlight, and annotate if you need to.

Task 2 - Develop a secure login feature. 
Login feature code screenshots

Why do you think it is secure?  Use bullet points to provide your reasons and back it up code snippet from your application.

Task 3 - Implement password strength and password recovery

List each password policy element that you implemented and back it up with code snippets from your application. 

Task 4 - Implement a “Evaluation Request” web page. 

Request Evaluation feature screenshot

Why do you think it is secure? 

Task 5 – Request Listing Page

Code of the feature

Why do you think it is secure?

Task 6 –AWS Virtual Private Cloud settings screen shots. 

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp



 

掃一掃在手機打開當前頁
  • 上一篇:RBE104TC代做、C/C++設計編程代寫
  • 下一篇:代寫CSE x25、C++/Java程序設計代做
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                中文字幕一区二区三| 国产精品久久久久影视| 精品国产凹凸成av人导航| 亚洲精品国产精华液| 亚洲精品国产视频| 国产一区二区精品久久| 欧美疯狂做受xxxx富婆| **性色生活片久久毛片| 国产在线视频不卡二| 久久婷婷久久一区二区三区| 久久国内精品视频| 国产视频911| 欧美日韩日日夜夜| 免费观看在线色综合| 日韩欧美亚洲国产精品字幕久久久| 亚洲柠檬福利资源导航| 欧美日韩一卡二卡三卡| 久久99精品国产.久久久久久| 欧美色图激情小说| 久久精品国产亚洲高清剧情介绍| 91精品国产91久久久久久一区二区| 自拍偷拍国产亚洲| 欧美一区二区三级| 97久久精品人人做人人爽| 一区二区三区四区精品在线视频| 欧美日韩一二区| 国内外成人在线| 视频在线观看一区二区三区| 精品精品国产高清一毛片一天堂| 色综合色狠狠综合色| 国产高清在线观看免费不卡| 亚洲第一综合色| 久久在线观看免费| 欧美日本免费一区二区三区| 99久久精品国产毛片| 玖玖九九国产精品| 人妖欧美一区二区| 亚洲成人综合视频| 亚洲成人动漫一区| 亚洲综合一二三区| 亚洲国产精品一区二区尤物区| 91精品国产品国语在线不卡| 91在线观看污| 欧美性色黄大片| 51精品视频一区二区三区| 欧美老人xxxx18| 欧美大肚乱孕交hd孕妇| 久久婷婷成人综合色| 国产目拍亚洲精品99久久精品| 久久色中文字幕| 国产精品污污网站在线观看| 最新成人av在线| 亚洲成人福利片| 韩国v欧美v亚洲v日本v| 国产福利一区在线| 欧美精品一区二区不卡| 国产乱对白刺激视频不卡| 久久久久久久久久久久久久久99| 久久国产福利国产秒拍| 久久婷婷国产综合国色天香| 成人激情小说网站| 亚洲国产精品久久艾草纯爱| 欧美另类一区二区三区| 亚洲一线二线三线视频| 在线视频中文字幕一区二区| 一区二区三区欧美在线观看| 欧美日韩国产片| 天堂影院一区二区| 精品少妇一区二区三区| 国产九色sp调教91| 亚洲欧美偷拍卡通变态| 欧美日韩第一区日日骚| 中文字幕在线视频一区| 99久久er热在这里只有精品15 | 视频一区二区欧美| 欧美久久一区二区| 亚洲永久免费av| 91欧美一区二区| 国产欧美日韩综合精品一区二区| 日本aⅴ精品一区二区三区| 日本高清不卡一区| 亚洲在线观看免费| 97精品久久久久中文字幕| 国产精品嫩草影院av蜜臀| 精品一二线国产| 久久久久久久综合色一本| 免费一级片91| 亚洲一区在线播放| 国产成人啪免费观看软件| 在线成人av网站| 久久男人中文字幕资源站| 国产在线乱码一区二区三区| 亚洲色图20p| 欧美一区国产二区| 日韩一区二区视频| 国产一区二区视频在线播放| 一区二区三区在线免费播放| 午夜久久电影网| 日韩一区二区电影网| 97se亚洲国产综合自在线观| 人人狠狠综合久久亚洲| 亚洲一区二区三区免费视频| 国产亚洲欧美在线| 欧美大片顶级少妇| 欧美videofree性高清杂交| 欧美日韩和欧美的一区二区| 欧美吞精做爰啪啪高潮| 欧美中文字幕一区二区三区亚洲| 一本大道久久a久久综合婷婷| 国产不卡免费视频| 在线播放一区二区三区| 国产精品色噜噜| 久久国产尿小便嘘嘘| 成年人网站91| 久久婷婷国产综合精品青草| 久久精品亚洲国产奇米99| 中文字幕乱码一区二区免费| 丁香激情综合五月| 日韩一卡二卡三卡国产欧美| 亚洲色图在线播放| 欧美视频日韩视频在线观看| 日韩欧美三级在线| 亚洲香蕉伊在人在线观| 中文字幕第一区第二区| 亚洲一区二区三区四区的| 韩国av一区二区三区四区| 色8久久精品久久久久久蜜| 精品91自产拍在线观看一区| 亚洲国产视频在线| 国产裸体歌舞团一区二区| 欧美日韩一区二区在线观看视频| 久久久国产精华| 青青草原综合久久大伊人精品 | 国产高清在线观看免费不卡| 在线观看不卡视频| 精品视频免费看| 久久精品一区八戒影视| 日韩高清在线一区| 欧美中文字幕一区二区三区 | 91视频免费播放| 久久综合狠狠综合| 九九**精品视频免费播放| 欧美日韩精品欧美日韩精品一| 国产精品久久久久久久久免费樱桃 | 欧美三级视频在线| 亚洲女人****多毛耸耸8| 成人涩涩免费视频| 国产午夜精品福利| 国产一区二区三区精品欧美日韩一区二区三区 | 91久久精品一区二区三| 国产欧美日韩精品a在线观看| 免费观看在线色综合| 色就色 综合激情| 亚洲欧美日韩中文播放 | 欧美美女一区二区| 樱桃国产成人精品视频| 成人激情图片网| 国产精品久久久久久久久久免费看| 国产在线播放一区| 国产视频一区在线播放| 成人小视频在线| 亚洲精品成人a在线观看| 欧美日韩精品二区第二页| 91精品国产一区二区三区蜜臀| 图片区日韩欧美亚洲| 91蝌蚪porny九色| 色乱码一区二区三区88| 一区二区三区不卡在线观看| 欧美日韩在线电影| 理论片日本一区| 国产三区在线成人av| youjizz国产精品| 亚洲激情图片小说视频| 5566中文字幕一区二区电影| 国产一区二区三区免费| 日韩精品中文字幕一区| 色偷偷成人一区二区三区91 | 一区二区三区免费网站| 欧美久久久影院| 国产成人综合亚洲网站| 亚洲欧美激情插| 波多野结衣亚洲一区| 亚洲综合一区二区| 精品国产乱码久久久久久闺蜜| 成人理论电影网| 日韩高清中文字幕一区| 国产精品乱码一区二区三区软件 | 日本人妖一区二区| 国产精品毛片久久久久久久| 欧美理论电影在线| 成人激情视频网站| 麻豆精品精品国产自在97香蕉| 国产精品第13页| 欧美大片日本大片免费观看| 91啪亚洲精品| 国产精品一品视频| 国产精品热久久久久夜色精品三区| 欧美日韩精品一区视频| 福利电影一区二区| 视频一区二区欧美|