Demonstrating Risky Resource Management Part I, programming homework help

Demonstrating Risky Resource Management Part I, programming homework help

Overview

In this homework you use NetBeans to create two different unique andcomplete demonstrations of Risky Resource Management such as Buffer Copy withoutChecking Size of Input, Improper Limitation of a Pathname to a Restricted Directory, Download of Code Without Integrity Check, and Inclusion of Functionality from Untrusted Control Sphere. You will demonstrate and describe how to fix each of the problems. Therefore,a total of four code samples will be created. Two will Risky Resource Management and two will have the issuesfixed.

AssignmentDetails

1. Using NetBeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should notjust be a code snippet. It should be part of a small application. In other words, you need to adapt the examples provided in the documentation to something more meaningful and substantive. It doesn’t have to be a large, overly complex application, but it needs to be complete, and runnable and demonstrate how this vulnerability may appear in the real world.

2. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed.

3. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in each of the two examples you created in step2.

4. Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.

Deliverables

Provide all of your source files for this assignment. Two source code files willhave software vulnerabilities. The remaining two will have the issues fixed. Provideany supplemental or utility files supporting your main sourcefiles.

Prepare a word or PDF file describing and demonstrating the vulnerabilities in each of your source files and specifically how you fixed the issue. You should demonstrate with screen shots and code within the document to report your findings.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper