Welcome to Assignments Writing

Your Trusted Partner in Term Paper Writing

At Assignments Writing, we’re a team of passionate educators and skilled writers committed to supporting students in their academic journey.

SNHU CS Sofware Security Questions

SNHU CS Sofware Security Questions

ANSWER

  1. Understanding the Scenario:
    • Familiarize yourself with the scenario provided, which involves being a senior software developer responsible for a web application using Spring Framework.
  2. Learn About Spring Framework:
    • If you are unfamiliar with Spring, watch the provided video and explore the Spring Framework guides linked in the Supporting Materials section. This will help you understand the technology stack you’re working with.
  3. Identify Relevant Areas of Security:
    • Review the scenario and the architecture of the web application.
    • Decide which of the seven areas of security mentioned in the Vulnerability Assessment Process Flow Diagram (VAPFD) are relevant to assess for this software application. These areas might include authentication, authorization, data encryption, input validation, etc.
    • Document your findings in the Module Two Written Assignment Template.
  4. Justify Your Choices:
    • Provide reasoning for why you selected each area of security. Explain why these areas are relevant to the specific software application you’re assessing.
  5. Code Review:
    • Manually inspect the provided code base. You can upload the Module Two Written Assignment Code Base into Eclipse as a new project for review. Refer to the provided tutorial on how to do this.
    • Document your findings as you review the code. Identify any security vulnerabilities you discover.
  6. Mitigation Plan:
    • Once you’ve identified security vulnerabilities in the code, describe potential mitigation techniques. This could involve suggesting secure software design patterns, coding practices, or security libraries that can be used to address the identified vulnerabilities.
    • You may refer to the Module Two Resources, including your textbook, Secure Coding Guidelines for Java SE, the Common Vulnerabilities and Exposures (CVE) list, and the National Vulnerability Database for guidance.
    • Document your mitigation plan in the Module Two Written Assignment Template. This plan will guide the software development team in addressing the identified vulnerabilities.
  7. Submission:
    • Compile all your findings, justifications, and the mitigation plan in a 1- to 2-page Microsoft Word document using the provided Module Two Written Assignment Template.
    • Make sure to submit this document as your assignment.

Remember to follow the Vulnerability Assessment Process Flow Diagram (VAPFD) to structure your assessment and ensure that you cover all the necessary steps. This assignment will help you develop essential skills in identifying and mitigating security vulnerabilities in software applications.

SNHU CS Sofware Security Questions

QUESTION

Description

 

 

CS 305 Module Two Written Assignment Guidelines and Rubric

Overview

Writing code is difficult. Writing secure code can be even more challenging. As the developer, it is your responsibility to write secure code. You’ll know if your code is secure when you manually search for and identify possible security vulnerabilities. Developing this skill is important because it becomes more challenging as the number of lines and complexity of your code increase.

Fortunately, as you learned in this module, you can follow a workflow. You can also use tools that are widely accepted in the field of software security and vulnerability assessments. By following the Vulnerability Assessment Process Flow Diagram (VAPFD), you can focus your manual code inspection and narrow your search for possible security vulnerabilities within your code.

Specifically in this assignment, you will:

  • Determine relevant areas of security for a software application.
  • Identify software security vulnerabilities by manually reviewing source code.
  • Identify potential mitigation techniques that have been used to mitigate against vulnerabilities associated with known exploits.

Scenario

You’re a senior software developer in a team of software developers. You’re responsible for a complex web application that uses Spring Framework. The team has been tasked with implementing an expressive command input function for the application. You are told the team is currently using Version 2.6.5 of the spring-data-rest-webmvc in Spring Framework. You also want to use the Spring Expression Language to accomplish the task.

If you are unfamiliar with Spring, learn about Spring Framework by watching the video and exploring the guides linked in the Supporting Materials section.

Directions

As the lead person on this application, you are responsible for ensuring that the code is secure. You’ll need to assess potential vulnerabilities in the code and create a mitigation plan for any existing vulnerabilities that the software development team must address.

To begin, see the Vulnerability Assessment Process Flow Diagram (VAPFD), linked in Supporting Materials, to help guide your code review and mitigation plan.

Specifically, you must address the following rubric criteria:

  1. Areas of Security: Review the scenario and use what you know about the architecture of the web application to identify relevant areas of security that are applicable for a software application:
    1. Decide which of the seven areas of security are relevant to assess from the first level of the VAPFD.
    2. Document your findings for the software development team in the Module Two Written Assignment Template, linked in What to Submit.
  2. Areas of Security Justification: Justify your reasoning for why each area of security is relevant to the software application.
  3. Code Review Summary: Once you have identified the relevant areas of security to review from the first level of the VAPFD, work through the second level. At this stage, you should:
    1. Manually inspect the code base provided to identify which vulnerabilities exist by uploading the Module Two Written Assignment Code Base, linked in Supporting Materials, as a new project into Eclipse.
    2. Refer to the Uploading Files to Eclipse Desktop Version Tutorial, linked in Supporting Materials, for how to open the code base for review.
    3. Document your findings for the software development team in the Module Two Written Assignment Template provided.
  4. Mitigation Plan: Once you have manually inspected the code and identified the security vulnerabilities:
    1. Describe potential mitigation techniques. For example, describe secure software designs that you could use to address the software security vulnerabilities you identified.
    2. It may be helpful to refer to the Module Two Resources, including your textbook, the Secure Coding Guidelines for Java SE, the Common Vulnerabilities and Exposures (CVE) list, and the National Vulnerability Database.
    3. Document your findings for the software development team in the Module Two Written Assignment Template provided. This plan will be used by the software development team to address all vulnerabilities in the code.

What to Submit

Submit a completed Module Two Written Assignment Template as a 1- to 2-page Microsoft Word document.

Supporting Materials

The following resources support your work on this assignment:

VideoWhat Is the Spring Framework Really All About? (10:44)

ReadingSpring Quickstart Guide

ReadingBuilding REST Services With Spring

DiagramVulnerability Assessment Process Flow Diagram

Code BaseModule Two Written Assignment Code Base

Tutorial: Uploading Files to Eclipse Desktop Version Tutorial

Place Your Order Here

Our Service Charter


1. Professional & Expert Writers: We only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of master’s and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. We are known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: We have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Format & Features

Our Advantages

How It Works

1. Fill Order Form
2. Make payment
3. Writing process
4. Download paper

Fill in the order form and submit all your files, including instructions, rubrics, and other information given to you by your instructor.

Once you complete filling the forms, complete your payment. We will get the order and assign it to a writer.

When your order is completed, it’s assigned to an editor for approval. The editor approves the order.

Once approved, we will upload the order to your account for you to download.  You can rate your writer or give your customer review.

What Clients Said

{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

5
Mercy M
{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

5
Jane L
{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

4.5
Rayan M

LET US DELIVER YOUR ACADEMIC PAPER ON TIME!

We are a freelance academic writing company geared towards provision of high quality academic papers to students worldwide.

Open chat
1
Scan the code
Hello
Can we help you?