Sapp_Carrie_Unit9_IT481

.docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

481

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

8

Uploaded by CarrieRobinson21

Report
RUNNING HEAD: Unit 9 Assignment Sapp 1 Unit 9 Assignment IT481 Advanced Software Development Prof. Chenyao Zhang Carrie Sapp September 29 th , 2023
Unit 8 Assignment Sapp 2 Carrie Sapp IT481 Advanced Software Development Prof. Chenyao Zhang September 29 th , 2023 Security Techniques In this week’s assignment, we establish the implementing of security techniques within code in order to better secure it. Security techniques are implemented to strengthen security within applications and programs, ensuring that if any hackers or breach attacks were to occur, this will aid in prevention of these attacks due to the increase of security. With this, we will identify different security techniques within this project, summarizing each one and describing how this aids in advancing security to the overall program. The first technique we will identify is input validation. Input validation is a security technique that ensures only the desired formatted data is allowed access into a software application or system component (OWASP, 2023). We have already implemented input validation into this form, providing a User and a Password sign in for a previous assignment. To better secure the form, we will make a change in where we add a limit to how many characters can be inputted for a password. This enables that users are required to enter the desired amount of characters (in this case 8 or more) and if they fail to, they are unable to log in. In this case, this can aid in strengthening security against attackers. With this, providing a longer password containing a larger combination of characters can make it more difficult for the attacker or hacker to guess. The second technique we will discuss is access control. Access control allows for role- based authentication, limiting privileges and restricting access to secure data only to users who
Unit 8 Assignment Sapp 3 need it (Harvey, 2020). This technique determines which user is allowed access to certain data connected through the database. For example, within the Northwind database, there are three main user roles: User_CEO, User_Sales, and User_HR. The User_CEO is allowed access to all information through the database, whereas the User_Sales and User_HR are given limited access to specific information. By implementing access control, we implement the IsAccessible = true/ IsAccessible = false statement using the “if” loop to indicate which user is able to access what information. In doing so, this provides better security in ensuring only specific users are able to access certain information, in that unauthorized users are not able to retrieve sensitive information that if were to fall into the wrong hands, could lead to potential data leaks. Code Screenshots Before security techniques: Input Validation Code:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Simplify each expression. cos² (37°) - sin² (37°) 6 sin (5x) cos(5x) Solve for all solutions on the…
Q: . 6. Calculate the flux integral f F n ds, where C is the positively oriented circle of radius 1…
Q: What gate is represented by the logic equation X=A+B? O AND OR O XOR O NAND
Q: ) Explain homology, list and explain the different types of homologies (also give examples)and why…
Q: x is a binomial random variable from a binomial experiment with n = 18 and p = 0.7. a. Compute P(x =…
Q: Which of the following is a cost pool used with the activity-based costing method? a. total factory…
Q: How many different DNA sequences could code for amino acid sequence Met-His-Leu-Thr-Trp-Lys?  (Note:…
Q: Pyruvate dehydrogenase complex is the key enzyme that regulates the TCA cycle. De-phosphorylation of…
Q: In the decades immediately following the American Civil War, the United States policy of…
Q: Calculate the Resultant Condition of the PIN in the drawing below: 1.000 O 1.060 0.982 O.995 0.008 C…
Q: In fruit flies, long wings (M) is dominant to miniature wings (m) and red eyes (B) is dominant to…
Q: The lifetime of an Acme heat pump has an Exponential distribution with a mean of 12 years. Suppose…
Q: Since the SUTA rates changes are made at the end of each year, the available 2021 rates were used…
Q: Evaluate lim (z,y) → (0,0) 1 - cos(xy) x²y²( −3+ y)
Q: Find a tight bound solution for the following recurrence: T(n) = 4 T(n/2) + c n      (c is a…
Q: can you do these classes for me in python please?
Q: The compressive strength of alumina quartz (Al2O3) is 2.1 GPa. A quartz tube is being used for a…
Q: 1. Let T: R² → R2 be the linear transformation T[*]-[***] a) Find [T] where a is the standard basis…
Q: The total positional tolerance equals the sum of the tolerance. O bonus and plus/minus O limit and…
Q: Department M had 2,400 units 54% completed in process at the beginning of June, 11,000 units…
Q: Evaluate the line integral, where C is the given curve.   xyeyz dy,   C: x = 3t,    y = 4t2,    z =…
Q: 50 V + 6Ω M 3 i 2 Ω Σ8Ω 4Ω Ds 5Α