Home / Uncategorized / Web page security -content– Create a report in a 2- to 3-page Microsoft Word document addressing the following: Locate the PHP code for validating the user’s login information. Use the variables defined there to restrict the content page to only those who have successfully logged into the system. Describe how the session is managed from page to page in the application. How long is the session active by default? What conditions will end the session? Identify the form validation rules that need to be put in place for the login form and the registration form. What format should the data have? What is the maximum length of each item? Identify the necessary functions in JavaScript and PHP to create these validation rules and list them in your report. W3A2 Create a report in a 2- to 3-page Microsoft Word document addressing the following: Within the application code, implement the input validation formatting that you suggested in W2 Assignment 2. In the report for this week, identify the functions you implemented in JavaScript and PHP and explain how these functions have made your application more secure against attacks. Review the code and information that the application records and uses. Identify information that should be protected with cryptography. Why should this information be protected? Is there a cryptography solution within PHP that will address this need? If not, what type of cryptosystem should be used to protect the information and how should it be implemented within the application? Explain the difficulty of implementing cryptography and why the cryptosystem must be chosen carefully for any application. Using the modified code for this week,Identify the potential exploits and access points for the software. Identify any new vulnerability you have discovered in the system and evaluate whether the modifications you have made addressed these issues or whether they are still present. List at least five potential exploits of the system and an analysis of each. Review the list of defense measures that should be implemented. Identify any new defense measure that you feel should be included in the list. Evaluate whether the steps you have taken to modify the application have implemented these measures successfully. List at least five defense measures needed and an analysis of each. PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT

Web page security -content– Create a report in a 2- to 3-page Microsoft Word document addressing the following: Locate the PHP code for validating the user’s login information. Use the variables defined there to restrict the content page to only those who have successfully logged into the system. Describe how the session is managed from page to page in the application. How long is the session active by default? What conditions will end the session? Identify the form validation rules that need to be put in place for the login form and the registration form. What format should the data have? What is the maximum length of each item? Identify the necessary functions in JavaScript and PHP to create these validation rules and list them in your report. W3A2 Create a report in a 2- to 3-page Microsoft Word document addressing the following: Within the application code, implement the input validation formatting that you suggested in W2 Assignment 2. In the report for this week, identify the functions you implemented in JavaScript and PHP and explain how these functions have made your application more secure against attacks. Review the code and information that the application records and uses. Identify information that should be protected with cryptography. Why should this information be protected? Is there a cryptography solution within PHP that will address this need? If not, what type of cryptosystem should be used to protect the information and how should it be implemented within the application? Explain the difficulty of implementing cryptography and why the cryptosystem must be chosen carefully for any application. Using the modified code for this week,Identify the potential exploits and access points for the software. Identify any new vulnerability you have discovered in the system and evaluate whether the modifications you have made addressed these issues or whether they are still present. List at least five potential exploits of the system and an analysis of each. Review the list of defense measures that should be implemented. Identify any new defense measure that you feel should be included in the list. Evaluate whether the steps you have taken to modify the application have implemented these measures successfully. List at least five defense measures needed and an analysis of each. PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT

Leave a Reply

WPMessenger