can you please help me 5

STUCK with your assignment? When is it due? Hire our professional essay experts who are available online 24/7 for an essay paper written to a high standard at a reasonable price.

Order a Similar Paper Order a Different Paper

You will be given an application code to analyze different aspects of security each week and simulate the process of securing software for production release.

Click here to access the code.

The code contained in the file is a web application that enables the users to view a list of online pets for adoption. To view the available list, users need to first register and then log on to the application.

This week, you will familiarize yourself with the code and begin to identify security issues. You can load the HTML page in a browser to help explore the potential entry points of the software. Analyze and create a report in a 2- to 3-page Microsoft Word document addressing the following:

  • Create a map of the software components and how they interact (using Microsoft Visio or Microsoft Canvas). Include appropriate labels and interactions for the different components.
  • Describe the functionality of the software and list the entry points for users to interact with the software (these will also be the primary entry points for an attacker).
  • Describe several potential ways in which attackers could compromise the software system and what they could do with the access they gain.
  • Identify a preliminary set of defense measures that can be taken for this software system.

Support your responses with examples.

Cite any sources in APA format.

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order

Order a Similar Paper Order a Different Paper