Computer Science Homework Help

Computer Science Homework Help. Software Security Vulnerabilities Project

  1. Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:
    1. Provide a brief, high-level overview of the encryption algorithm cipher.
    2. Discuss the hash functions and bit levels of the cipher.
    3. Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.
    4. Describe the history and current state of encryption algorithms.
  1. Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.
    1. To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.
  1. Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.
    1. Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.
  1. Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.
    1. Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.
  1. Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.
    1. Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.
  1. Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.
    1. Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.

What if I receive errors or new vulnerabilities?
You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.

  1. Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:
    1. Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.
    2. Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.
    3. Point out best practices for maintaining the current security of the software application to your customer.

Computer Science Homework Help

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"