Question: a. b. C. Suggest and justify THREE (3) architecture security tactics to be used when designing an e-learning system. Based on your suggestion in
a. b. C. Suggest and justify THREE (3) architecture security tactics to be used when designing an e-learning system. Based on your suggestion in part (a), explain a design pattern that can be used to implement the security tactics. 1. Analyse the following code snippet and explain whether the code is complying to secure coding standard, and it is referring to which application security vulnerabilities. ii. [6 marks] connection.preparestatement (sqlString); stmt.setString (1, username); stmt.setString (2, pwd); ResultSet rs = stmt.executeQuery(); [6 marks] String sqlString = "select from db_user where username=? and password ?"; PreparedStatement stmt= MessageDigest md= MessageDigest.getInstance ("SHA1") [4 marks]
Step by Step Solution
3.54 Rating (151 Votes )
There are 3 Steps involved in it
Lets address each part of the question one by one a Suggest and justify THREE 3 architecture security tactics to be used when designing an elearning s... View full answer
Get step-by-step solutions from verified subject matter experts
