Need Help ?

Home / Expert Answers / Other / Description CS 305 Module Two Written Assignment Guidelines and Rubric Overview Writing code is di

Description CS 305 Module Two Written Assignment Guidelines and Rubric Overview Writing code is di ...


Description CS 305 Module Two Written Assignment Guidelines and Rubric Overview Writing code is difficult. Writing secure code can be even more challenging. As the developer, it is your responsibility to write secure code. You’ll know if your code is secure when you manually search for and identify possible security vulnerabilities. Developing this skill is important because it becomes more challenging as the number of lines and complexity of your code increase. Fortunately, as you learned in this module, you can follow a workflow. You can also use tools that are widely accepted in the field of software security and vulnerability assessments. By following the Vulnerability Assessment Process Flow Diagram (VAPFD), you can focus your manual code inspection and narrow your search for possible security vulnerabilities within your code. Specifically in this assignment, you will: Determine relevant areas of security for a software application. Identify software security vulnerabilities by manually reviewing source code. Identify potential mitigation techniques that have been used to mitigate against vulnerabilities associated with known exploits. Scenario You’re a senior software developer in a team of software developers. You’re responsible for a complex web application that uses Spring Framework. The team has been tasked with implementing an expressive command input function for the application. You are told the team is currently using Version 2.6.5 of the spring-data-rest-webmvc in Spring Framework. You also want to use the Spring Expression Language to accomplish the task. If you are unfamiliar with Spring, learn about Spring Framework by watching the video and exploring the guides linked in the Supporting Materials section. Directions As the lead person on this application, you are responsible for ensuring that the code is secure. You’ll need to assess potential vulnerabilities in the code and create a mitigation plan for any existing vulnerabilities that the software development team must address. To begin, see the Vulnerability Assessment Process Flow Diagram (VAPFD), linked in Supporting Materials, to help guide your code review and mitigation plan. Specifically, you must address the following rubric criteria: Areas of Security: Review the scenario and use what you know about the architecture of the web application to identify relevant areas of security that are applicable for a software application: Decide which of the seven areas of security are relevant to assess from the first level of the VAPFD. Document your findings for the software development team in the Module Two Written Assignment Template, linked in What to Submit. Areas of Security Justification: Justify your reasoning for why each area of security is relevant to the software application. Code Review Summary: Once you have identified the relevant areas of security to review from the first level of the VAPFD, work through the second level. At this stage, you should: Manually inspect the code base provided to identify which vulnerabilities exist by uploading the Module Two Written Assignment Code Base, linked in Supporting Materials, as a new project into Eclipse. Refer to the Uploading Files to Eclipse Desktop Version Tutorial, linked in Supporting Materials, for how to open the code base for review. Document your findings for the software development team in the Module Two Written Assignment Template provided. Mitigation Plan: Once you have manually inspected the code and identified the security vulnerabilities: Describe potential mitigation techniques. For example, describe secure software designs that you could use to address the software security vulnerabilities you identified. It may be helpful to refer to the Module Two Resources, including your textbook, the Secure Coding Guidelines for Java SE, the Common Vulnerabilities and Exposures (CVE) list, and the National Vulnerability Database. Document your findings for the software development team in the Module Two Written Assignment Template provided. This plan will be used by the software development team to address all vulnerabilities in the code. What to Submit Submit a completed Module Two Written Assignment Template as a 1- to 2-page Microsoft Word document. Supporting Materials The following resources support your work on this assignment: Video: What Is the Spring Framework Really All About? (10:44) Reading: Spring Quickstart Guide Reading: Building REST Services With Spring Diagram: Vulnerability Assessment Process Flow Diagram A text-only version is available: Vulnerability Assessment Process Flow Diagram Text-Only Version. Code Base: Module Two Written Assignment Code Base Tutorial: Uploading Files to Eclipse Desktop Version Tutorial Explanation & Answer: 1 Task User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.





We have an Answer from Expert

View Expert Answer

Expert Answer


CS 305 Module Two Written Assignment Overview

Areas of Security:

In the context of a complex web application using the Spring Framework, several areas of security are crucial to ensure the integrity and protection of the application. These areas are essential for preventing attacks and ensuring the security of the software. From the first level of the Vulnerability Assessment Process Flow Diagram (VAPFD), the following areas are relevant for assessment:

  1. Input Validation: This is critical because the application will process user inputs, which may include commands via the Spring Expression Language. Malicious or unexpected inputs can lead to SQL injection, cross-site scripting (XSS), or remote code execution vulnerabilities. Proper validation ensures only acceptable inputs are processed.
  2. Authentication and Authorization: Since this is a web application, controlling access to specific resources and verifying user identity are key to preventing unauthorized access. Issues such as improper role-based access control (RBAC) can lead to security breaches.
  3. Session Management: For web applications, session management ensures that user sessions are handled securely. Improper session handling, such as weak session expiration or cookie security settings, can lead to session hijacking or fixation attacks.
We have an Answer from Expert

Buy This Answer $5

Radioactive Tutors

Radio Active Tutors is a freelance academic writing assistance company. We provide our assistance to the numerous clients looking for a professional writing service.

NEED A CUSTOMIZE PAPER ON THE ABOVE DETAILS?
Order Now


OR

Get outline(Guide) for this assignment at only $10

Get Outline $10

**Outline takes 30 min - 2 hrs depending on the complexity and size of the task
Designed and developed by Brian Mubichi (mubix)
WhatsApp