G6077 Introduction to Computer Security

Report

You will be submitting this report to the Canvas. The report has 7 tasks. From 1 to 6, it covers the secure application part and the last task 7 covers the AWS. You will provide the three required links below.

  1. Application URL: ----------------------------------

(URL to your web-application, this can be hosted anywhere. You will need to ensure that it is available till end of Jan for us to assess.)

  1. Code file Location: --------------------------------------

Upload your code to OneDrive and provide a link here. Set up correct permission so that anyone with a link can view it.

  1. Panopto recording and possibly test users’ detail:------------------------------------------

 If you don’t provide this, we will not be able to test your work fully and will not be able to see it working.

Task 0 – Self-reflection

Marking grid filled up by you. Fill it up and past it here. We expect you to self-assess yourself fairly. See the example in Canvas.

Task 1 – User registration 

Registration feature code screenshots

Database Table

Why do you think it is secure?  Use bullet points to provide your reasons and back it up with code snippet from your application. Don’t paste the big junks of code in the report, show us those specific lines, highlight, and annotate if you need to.

-

-

-

Task 2 - Develop a secure login feature. 

Login feature code screenshots

Why do you think it is secure?  Use bullet points to provide your reasons and back it up code snippet from your application.

Task 3 - Implement password strength and password recovery

List each password policy element that you implemented and back it up with code snippets from your application.

Task 4 - Implement a “Evaluation Request” web page. 

Request Evaluation feature screenshot

你可能感兴趣的:(学习方法)