2173 Salk Avenue, Suite 250 Carlsbad, CA

support@assignmentprep.info

Overview Writing code is difficult. Writing secure code can be even more challen

Overview
Writing code is difficult. Writing secure code can be even more challenging. As the developer, you are responsible for writing secure code. You’ll know your code is secure when you manually search for and identify possible security vulnerabilities. Developing this skill is important because it becomes more challenging as the number of lines and complexity of your code increase.
As you learned in this module, you can follow a workflow. You can also use tools widely accepted in software security and vulnerability assessments. You can focus your manual code inspection and narrow your search for possible security vulnerabilities within your code by following the vulnerability assessment process flow diagram.
Specifically, in this assignment, you will complete the following actions:
Determine relevant areas of security for a software application.
Identify software security vulnerabilities by manually reviewing source code.
Identify potential mitigation techniques that have been used to mitigate vulnerabilities associated with known exploits.
Scenario
You are a senior software developer on a team of software developers. You are responsible for a complex web application that uses the Spring framework. The team has been tasked with implementing an expressive command input function for the application. The team is using version 2.6.5 of the spring-data-rest-webmvc in the Spring framework. You also want to use the Spring Expression Language to accomplish the task.
Review the resources in this module’s Resources section to learn about the Spring framework.
Directions
As the lead person on this application, you are responsible for making certain that the code is secure. You will need to assess potential vulnerabilities in the code and create a mitigation plan for any existing vulnerabilities that the software development team must address.
To begin, see the vulnerability assessment process flow diagram linked in the Supporting Materials section to help guide your code review and mitigation plan.
Specifically, you must address the following rubric criteria:
Areas of Security: Review the scenario and use what you know about the architecture of the web application to identify relevant areas of security that are applicable for a software application:
Provide sufficient detail to address which of the seven areas of security are relevant to assess from the first level of the vulnerability assessment process flow diagram.
Document your findings for the software development team in the Module Two Written Assignment Template linked in the What to Submit section.
Areas of Security Justification: Provide a justification and rationale for why each area of security is relevant to the software application.
Code Review Summary: Once you have identified the relevant areas of security to review from the first level of the vulnerability assessment process flow diagram, work through the second level. At this stage, you should complete the following actions:
Manually inspect the code base provided to identify which vulnerabilities exist. To do this, upload the Module Two Written Assignment Code Base linked in the Supporting Materials section as a new project into Eclipse.
Refer to the Uploading Files to Eclipse Desktop Version Tutorial linked in the Supporting Materials section to learn how to open the code base for review.
Document your findings in detail for the software development team in the Module Two Written Assignment Template.
Mitigation Plan: Once you have manually inspected the code and identified the security vulnerabilities, complete the following actions:
Describe potential mitigation techniques. For example, describe secure software designs that you could use to address the software security vulnerabilities you identified.
Refer to the Module Two Resources section for help with this response.
Document your findings for the software development team in the Module Two Written Assignment Template. The software development team will use this plan to address all vulnerabilities in the code.
What to Submit
Submit a completed Module Two Written Assignment Template as a 1- to 2-page Microsoft Word document.
Supporting Materials
The following resources support your work on this assignment:
Diagram: Vulnerability Assessment Process Flow Diagram
This diagram illustrates the process flow for conducting an architecture review and code review to identify security vulnerabilities in code. Reference this diagram as you complete the assignments for this module.
A text-only version is available: Vulnerability Assessment Process Flow Diagram Text-Only Version.
Code Base: Module Two Written Assignment Code Base
This resource provides the code base needed for the Module Two written assignment. 
Tutorial: Uploading Files to Eclipse Desktop Version Tutorial
This tutorial highlights how to upload files to Eclipse.

Struggling With a Similar Paper? Get Reliable Help Now.

Delivered on time. Plagiarism-free. Good Grades.

What is this?

It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!

Why do you do it?

Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!

How does it work?

You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.

What kind of writer will work on my paper?

Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.

Our team is comprised of native English speakers working exclusively from the United States. 

Will the paper be original?

Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.

Is it free?

No, it’s a paid service. You pay for someone to work on your assignment for you.

Is it legit? Can I trust you?

Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.

Will you deliver it on time?

Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.

Can you get me a good grade? It’s my final project and I need a good grade.

Yes! We only pick projects where we are sure we’ll deliver good grades.

What do you need to get started on my paper?

* The full assignment instructions as they appear on your school account.

* If a Grading Rubric is present, make sure to attach it.

* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.

* Any templates or additional files required to complete the assignment.

How do I place an order?

You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.

How will I receive my paper?

We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.

Getting Your Paper Today is as Simple as ABC

No more missed deadlines! No more late points deductions!

}

You give us your assignments instructions via email or through our order page.

Our support team selects a qualified writing team of 2 writers for you.

l

In under 5 minutes after you place your order, research & writing begins.

Complete paper is delivered to your email before your deadline is up.

Want A Good Grade?

Get a professional writer who has worked on a similar assignment to do this paper for you