Question: a. b. C. Suggest and justify THREE (3) architecture security tactics to be used when designing an e-learning system. Based on your suggestion in

a. b. C. Suggest and justify THREE (3) architecture security tactics to be used when designing an e-learning  

a. b. C. Suggest and justify THREE (3) architecture security tactics to be used when designing an e-learning system. Based on your suggestion in part (a), explain a design pattern that can be used to implement the security tactics. 1. Analyse the following code snippet and explain whether the code is complying to secure coding standard, and it is referring to which application security vulnerabilities. ii. [6 marks] connection.preparestatement (sqlString); stmt.setString (1, username); stmt.setString (2, pwd); ResultSet rs = stmt.executeQuery(); [6 marks] String sqlString = "select from db_user where username=? and password ?"; PreparedStatement stmt= MessageDigest md= MessageDigest.getInstance ("SHA1") [4 marks]

Step by Step Solution

3.54 Rating (151 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Lets address each part of the question one by one a Suggest and justify THREE 3 architecture security tactics to be used when designing an elearning s... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!