Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Advanced Topics in Digital Security

Objectives

- To apply skills and knowledge acquired throughout the trimester in exploiting web application security loopholes and the techniques to fix such loopholes.
- To demonstrate ability to use WebGoat to test security exploits on web applications and servers.
- To gain experience in documenting every application exploit that was tested.

Problem Statement

You are required to perform security exploits on web applications and websites. To complete this assignment, you need to select and choose FOUR of the security topics of web application security lessons specified in the WebGoat J2EE web application package, including topics and tools that we have not covered but you may find interesting. You may choose to use WebGoat and any appropriate tools from the SIT704 CloudDeakin course website to complete this assignment. You can also use other non-commercial (free and open-source) tools (e.g. WebScarab, Wireshark, w3af, metasploit) to help you complete this assignment. You are not allowed to use any commercial security-related or automated hacking products such as IBM Security AppScan for this assignment. To demonstrate your achievement of these goals, you must write a 2,000 word report.

Your report should consist of the following chapters:

1. A proper title which matches the contents of your report.

2. Your name and Deakin student number in the author line.

3. An executive summary which summarizes your findings.

(You may find hints on writing good executive summaries from http://unilearning.uow.edu.au/report/4bi1.html.)

4. An introduction chapter which lists the four vulnerabilities of your choice, the impact of these vulnerabilities, the brief summary of your findings, and the organization of the rest of your report.

5. A literature review chapter which surveys the latest academic papers regarding the four vulnera- bilities of your choice. With respect to each vulnerability, you are advised to identify and include at least two papers published by ACM and IEEE journals or conference proceedings. Your review must not simply be a summary of each paper, but rather a deep analysis of the body of work reported in the set of paper. Your aim in this part of the report is to demonstrate deep and thorough understanding of the existing body of knowledge encompassing multiple vulnerabilities of modern web applications. (Please read through the hints on this web page before writing this chapter http://www.uq.edu.au/student-services/learning/literature-review.)

6. A technical demonstration chapter which consists of fully explained screenshots when your tests were conducted. That is, you should explain the identification of your target web services or web applications, the information about the server(s), each step of the procedure of exploitation, and the results. You must prove that your tests are original.

7. A conclusions chapter which summarizes major findings of the study and indicates future work which should be conducted in the area.

8. A bibliography list of all cited papers and other resources. You must use in-text citations in Harvard style and each citation must correspond to a bibliography entry. There must be no bibliography entries that are not cited in the report. (You should know the contents from this page http://www.deakin.edu.au/students/study-support/referencing/harvard.)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91776300
  • Price:- $105

Guranteed 48 Hours Delivery, In Price:- $105

Have any Question?


Related Questions in Computer Network & Security

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Compare the importance of three categories described in the

Compare the importance of three categories described in the article: 1. window of exposure, 2. full public disclosure, 3. reasonable disclosure for three types of software applications: 4. military, 5. medical, 6. educat ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As