Question: Part 3 : Secure programming For this part, you are to develop a strategy to improve the security of a piece of software using secure

Part 3: Secure programming For this part, you are to develop a strategy to improve the security of a piece of software using secure programming techniques. The output of this part is a report in PDF format. Instructions Consider one of the web-applications you have seen in the degree (or anywhere else) so far. It can be any web application. The chosen application should include a login page to check a username and password using a database. Additionally, the application should provide a separate registration page, allowing new users to sign up, to define a username, and to set a password. This application should then store these new usernames and passwords into the database. Assume the client sends everything as a text (without using any encryption algorithm) to the server using the GET method. we'll assume that the passwords are stored in the database as plain text. Other parts of the application can be anything. Referring to the strategies in OWASPs secure coding guidelines available at describe FIVE things you can do to the code in that application to improve its security. Report your secure programming plan. Note that you do not need to actually implement the secure code, just report on what you plan to do.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!