Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Programming Secure Software Systems Case Study: Safe programming issues

Related outcomes from the unit outline: 

1. Analyse the existence of vulnerabilities inherent in insecure software products

2. Assure quality by using elements of a secure framework

3. Judge the effectiveness of mitigation strategies for security vulnerabilities

Case Description: Vulnerability Detection, Analysis and Mitigation

The problem space is the File Transfer Protocol (FTP).  You will be given some code samples to evaluate.  You should:

  • Provide a short discussion (2-3 pages) of the existing vulnerabilities in the protocol.
  • Clearly identify vulnerabilities in the code samples.
  • Describe and implement (i.e., modify the code) mitigations.
  • Amend the code (without introducing new vulnerabilities) by providing commandline parameters in place of the existing interface.
  • Referring back to the first point, demonstrate that, whilst your code may be now secure, the protocol itself is still insecure.
  • Discuss and implement (if possible) a secure implementation of the protocol by adding to your code. The objective is not to write new code, but to use existing libraries.
  • Ensure that your code compiles/links with gcc and runs within the Linux environment supplied in the unit.

You must:

  • Provide a zip file containing your assignment as a Word document. The assignment should contain your code. No other compression formats accepted. No other document formats accepted.

Document Style

  • Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers.

Attachment:- Assignment Files.zip

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92300539

Have any Question?


Related Questions in Computer Engineering

Discuss the impact of the market on well-diversified

Discuss the impact of the market on well-diversified portfolios. What does this suggest about the performance of mutual funds? Include real-world examples in your explanation.

Questionbased on the option chain below consider an

Question: Based on the option chain below : Consider an asymmetric butterfly constructed using the given put options with the low strike at 58, the peak at 60 and the high strike at 64, for one unit of the underlying ass ...

Taylor found that 8 of the recipients of loans form a

Taylor found that 8% of the recipients of loans form a particular mortgage lender default within 3 years. If he takes a random sample of 736 customers who received loans 3 years ago, what is the average number of custome ...

1 a router operates at which osi layer application

1. A router operates at which OSI layer? Application Presentation Session Transport Network Data Link Phsical 2. Suppose application data of size X bytes is transmitted from system A to system B via the OSI layers and th ...

The formulas a rarr b and c and a rarr b and a rarr c are

The formulas A → (B ∧ C) and (A → B) ∧ (A → C) are logically equivalent. For this problem, you are going to prove that they are equivalent in two different ways. Prove that A → (B ∧ C) ≡ (A → B) ∧ (A → C) by writing two ...

Explain the differences between working in the web based

Explain the differences between working in the web based version of Outlook in Office 365 to the desktop application version of Outlook.

The police lieutenant in charge of the traffic division

The police lieutenant in charge of the traffic division reviews the number of traffic citations issued by each of the police officers in his division. He finds that the mean number of citations written by each officer is ...

Assignmentnbspon information systems audit and

Assignment  on Information Systems audit and controls Assignment purpose: Elaborate on the different types of control that are applied in a hospital (Preventive, detective and corrective control). Evaluate the logical an ...

Question suppose that a web server has a link speed of

Question : Suppose that a web server has a link speed of 1Gbps. And suppose that each machine in a botnet has a link speed of 1Mbps a. How many botnet machines are needed to send data to the web server in order to fill t ...

Problem a design a 64kb 8-way set associative cache that

Problem : A. Design a 64KB 8-way set associative cache that has 32 words per blocks and 4 bytes per word (MIPS type). Assume a 32 bit address. a) Calculate the following a How many bits are used for the byte offset? b) H ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As