building secure web applications week 5

 

Week Five Assignment

Learn About creating good password security.An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT. 

Question 10

  

After completing the reading this week, we reflect on a few key concepts this week:

1. Discuss what performance management is and how it influences effective teams.

2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.

3. Note at least two organizational capabilities and compare and contrast each.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Use APA references and in-text citations.

The following information

  

1. The following information is listed for the configuration of a router: Internet Port: MAC Address – 00:21:3D:AE:2C:A6 IP Address – 70.115.23.137 DHCP – DHCP Client IP Subnet Mask – 255.255.240.0 Domain Name Server – 209.18.47.61, 209.18.47.62 LAN Port: MAC Address – 00:21:3D:AE:2C:A5 IP Address – 192.168.1.1 DHCP – OFF IP Subnet Mask – 255.255.255.0 

(a) The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router? 

(b) The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router? 

(c) Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized? 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.

à i) WWW

ii) DNS

iii) FTP

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network. 

ITSD322U4DB

 

One of the central concepts of Object-Oriented Programming is class inheritance. This allows a new custom class to inherit and extend the properties and methods of a base class to suit the specific needs of the application.

Example:

“Cars” (base class) (level 1)

  • bodyStyle (property)
  • color (property)

Gasoline (inherits from “Cars”) (level 2)

  • displacement (property)
  • emissions (property)

Electric (inherits from “Cars”) (level 2)

  • batterySize (property)
  • regenerativeBraking (property)

Ford (inherits from “Gasoline”) (level 3)

  • model (property)
  • (additional properties – features, options and accessories)

Tesla (inherits from “Electric”) (level 3)

  • model (property)
  • (additional properties – features, options and accessories)

Using your knowledge, experience and ideas, and considering what you’ve learned from the unit learning activities and other resources, create a set of custom classes in three inheritance levels for an application for a business or organization (like the example above). You will not program this application, just think about it and discuss it. The first level, consisting of a single custom class, should represent the highest conceptual level, with each subsequent level being more specific and more likely to apply to a real product or service. The second and third levels should have 2-3 classes each, with the classes on the third level inheriting from classes in the second level.

In your replies to fellow students, consider the custom classes they’ve devised and the program they envision. Suggest additional classes, and/or additional properties and/or methods that would enhance these classes and the overall functionality of the application.

Create your own Subprogram that

  

Create your own Subprogram that uses at least one input parameter and a return parameter. You decide the theme. You should provide the pseudocode and an example Subroutine call. Be sure to provide an overview of what your subprogram is doing.

Cybercrime

 

In order to complete Assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

Describe a recent cybercrime and what cyber crime theory you believe applies to this case? Please explain the reasons why the theory you picked applies.

Topics: 1, 2 , 3 , 4,

Term Project – Research Paper Presentation Content

Final Term Project – Term Project – Research Paper & Presentation document for detailed information about requirements for the content of the Presentation

Include at least 12 slides (of content) that include the following (note that each group should select 2 slides for 2 topics marked below with 2 slides,presentation should total at least 12 slides):

1. Title Page: APA 7 formatted Title Page.

2. Introduction – 2 slides

3. Background – 2 slides

4. Root Cause of Problem – 2 slides

5. What Went Wrong – 2 slides

6. Literature Review

7. Discussion – 2 slides

8. Recommendations – 2 slides

9. Conclusions – 2 slides

10. Reference Page: APA 7 formatted Reference Page.

CPTED Best Practices

Research Paper needs to be submitted on CPTED Best Practices. The research paper should be 1400 words. The paper format should be in the attached file format.

The assignment is needed by April 16 at 1pm EST.