Question: I need help writing a JavaScript code that involves the username, password, and hash password. I need the code to be in Netbeans Java or

I need help writing a JavaScript code that involves the username, password, and hash password. I need the code to be in Netbeans Java or converted to Netbeans java.  I need help writing a JavaScript code that involves the username,
password, and hash password. I need the code to be in Netbeans
Java or converted to Netbeans java. Access Control Project Introduction Access control
is a critical component of any network and computer security mechanism. effective
access control mechanism ensures that only users with valid log in credentials

Access Control Project Introduction Access control is a critical component of any network and computer security mechanism. effective access control mechanism ensures that only users with valid log in credentials can access a computer network or resources on a network. A common form of login access control is the username and password authentication mechanism. The mechanism could be a single stage or multi-stage authentication process. In a single stage authentication mechanism a valid password is sufficient to grant access to a system. A multi-stage authentication mechanism requires further information beyond valid username and password to authenticate a user. For example, a user might need to enter a valid security code after the system verifies the user's password An Project Description In this project, you will develop a Java computer program to simulate access control to a system network. The username and password authentication mechanism is used as an access control mechanism in this project. The program needs to authenticate the user with their username and hashed password stored in Access Manager User (AMU) file. To create an Access Manager User file, you need to develop a java program that takes rates a file containing the username, hashed assword, and plaintext password. In real world, the plaintext are not saved in the AMU file. However, you need the username and corresponding plaintext password for testing of your main program. The structure of the AMU file is shown in the appendix. Note that this should be done as a separate program. The main program operates in the following manner It first prompts the user to enter username and password. After the user enters both username and password, it hashes the naeeiord and search the AMUl file to verifv both the user name and password. If the program The main program operates in the following manner. It first prompts the user to enter username and password. After the user enters both username and password, it hashes the password and search the AMU file to verify both the user name and password. If the program verifies the username and password, it returns the message "Access Granted." If the program could not verify the username, it returns the message "Access Denied. You are not a registered user." If the program verifies the username but not the password, it prompts the user to enter the password again. If the user enter the password three times incorrectly, the system locks the user account and gives this message. "You exceeded entering the allowable number of incorrect password. Your account is locked. Contact system administrator to unlock your account" The computer program must be well documented. A sample of a well documented program is attached. Project Learning Obiectives .Gain a good understanding of user authentication mechanism Identify security issues with username and password authentication mechanism Computer Programming Learning Objectives 1. To enhance your knowledge of Java programming particularly in the following areas: Decision Structure Repetition Structure Arrays User defined functions and classes Utilization of Java libraries and functions . .Object oriented programming Formatted outputs 2. To design a well documented program according to the industry standards Learning Outcomes Upon the successful completion of this project, you will gain a better understanding of the following course concepts Access control mechanism using user authentication process Shortcomings of single stage access control mechanism Additionally, you will enhance your knowledge and skills in writing a well documented java program with medium complexity according to software engineering standards Program Structure Your program for this project should include the following 5 distinct sections as shown below. Note that the program gets its input data from the user interactively. The attached sample program shows the structure described below and the way to document a program. Program Header: (Programmer's Name, Class, Date, Program's Name, Program's Description) this section is mainly documentation Declaration of Variables: (e.g.; integers, floats, strings, classes, objects, etc.) Program Inputs: List of input data (eg; username and password) Processes: Generating hash values of passwords using built-in hash functions in Java, comparison of hashed values using decision structures, Loop for prompting users to enter password Program Outputs: Program messages: for example, "Access Granted" Run the program for 4 cases: 1. correct username and password, 2. incorrect username, 3. correct username but incorrect password (repeated 4 times). 4. A hacker entering long username and/or password to test memory buffer overflow. A running example of the program is shown below: Case 1: Program inputs that are entered interactively: Enter your username: Smithn Enter your password:* Access Granted Program Outputs: Case2: Enter your username: Baileyf Enter your password: "Access Denied. You are not a registered user." Enter your username: Jonesm Program Outputs: Case3: Program Outputs: Incorrect password try again." Enter your password: Incorrect password try again." Enter your password: ** "You exceeded entering the allowable number of incorrect password. Your account is now locked. Contact system administrator to unlock your account" Case4 Enter your username: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Or with a valid username but very long password: Enter your username: Jonesm Enter your password.: w*w**w Access Control Project Introduction Access control is a critical component of any network and computer security mechanism. effective access control mechanism ensures that only users with valid log in credentials can access a computer network or resources on a network. A common form of login access control is the username and password authentication mechanism. The mechanism could be a single stage or multi-stage authentication process. In a single stage authentication mechanism a valid password is sufficient to grant access to a system. A multi-stage authentication mechanism requires further information beyond valid username and password to authenticate a user. For example, a user might need to enter a valid security code after the system verifies the user's password An Project Description In this project, you will develop a Java computer program to simulate access control to a system network. The username and password authentication mechanism is used as an access control mechanism in this project. The program needs to authenticate the user with their username and hashed password stored in Access Manager User (AMU) file. To create an Access Manager User file, you need to develop a java program that takes rates a file containing the username, hashed assword, and plaintext password. In real world, the plaintext are not saved in the AMU file. However, you need the username and corresponding plaintext password for testing of your main program. The structure of the AMU file is shown in the appendix. Note that this should be done as a separate program. The main program operates in the following manner It first prompts the user to enter username and password. After the user enters both username and password, it hashes the naeeiord and search the AMUl file to verifv both the user name and password. If the program The main program operates in the following manner. It first prompts the user to enter username and password. After the user enters both username and password, it hashes the password and search the AMU file to verify both the user name and password. If the program verifies the username and password, it returns the message "Access Granted." If the program could not verify the username, it returns the message "Access Denied. You are not a registered user." If the program verifies the username but not the password, it prompts the user to enter the password again. If the user enter the password three times incorrectly, the system locks the user account and gives this message. "You exceeded entering the allowable number of incorrect password. Your account is locked. Contact system administrator to unlock your account" The computer program must be well documented. A sample of a well documented program is attached. Project Learning Obiectives .Gain a good understanding of user authentication mechanism Identify security issues with username and password authentication mechanism Computer Programming Learning Objectives 1. To enhance your knowledge of Java programming particularly in the following areas: Decision Structure Repetition Structure Arrays User defined functions and classes Utilization of Java libraries and functions . .Object oriented programming Formatted outputs 2. To design a well documented program according to the industry standards Learning Outcomes Upon the successful completion of this project, you will gain a better understanding of the following course concepts Access control mechanism using user authentication process Shortcomings of single stage access control mechanism Additionally, you will enhance your knowledge and skills in writing a well documented java program with medium complexity according to software engineering standards Program Structure Your program for this project should include the following 5 distinct sections as shown below. Note that the program gets its input data from the user interactively. The attached sample program shows the structure described below and the way to document a program. Program Header: (Programmer's Name, Class, Date, Program's Name, Program's Description) this section is mainly documentation Declaration of Variables: (e.g.; integers, floats, strings, classes, objects, etc.) Program Inputs: List of input data (eg; username and password) Processes: Generating hash values of passwords using built-in hash functions in Java, comparison of hashed values using decision structures, Loop for prompting users to enter password Program Outputs: Program messages: for example, "Access Granted" Run the program for 4 cases: 1. correct username and password, 2. incorrect username, 3. correct username but incorrect password (repeated 4 times). 4. A hacker entering long username and/or password to test memory buffer overflow. A running example of the program is shown below: Case 1: Program inputs that are entered interactively: Enter your username: Smithn Enter your password:* Access Granted Program Outputs: Case2: Enter your username: Baileyf Enter your password: "Access Denied. You are not a registered user." Enter your username: Jonesm Program Outputs: Case3: Program Outputs: Incorrect password try again." Enter your password: Incorrect password try again." Enter your password: ** "You exceeded entering the allowable number of incorrect password. Your account is now locked. Contact system administrator to unlock your account" Case4 Enter your username: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Or with a valid username but very long password: Enter your username: Jonesm Enter your password.: w*w**w

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!