Continuous Assessment - 60% MSCCYB1_JAN20I - MSc in CyberSecurity Secure Programming for Application Development Submission on Moodle in Week 6 Introduction This assignment is worth 60% of your...

1 answer below »
I want to chat with who is handling it. thank you


Continuous Assessment - 60% MSCCYB1_JAN20I - MSc in CyberSecurity Secure Programming for Application Development Submission on Moodle in Week 6 Introduction This assignment is worth 60% of your overall marks for the course. This CA assesses the following learning outcomes: LO1 Investigate and critically assess the impact of application security vulnerabilities on users of software products. LO2 Investigate and critically assess the state of the art in the latest programming paradigms to create security controls that prevent common application security vulnerabilities. This CA is designed to investigate and critically assess the state of the art in the latest programming paradigms and languages to create security controls that prevent common application security vulnerabilities – Objective C, Assembly and Java. You have to research what are the security features provided by the languages, if new versions are released, what security concerns they address and also what are the security issues these languages are vulnerable to. Take any existing popular standalone application and detail the steps you would consider if rewriting it in Objective C or Java and explain how the research elements done in section above would apply to this application. Evaluation Process You are required to do a research report which consists of two parts - research on security related to programming languages and relating those to one standalone application from a real world example or your choice: Security aspect of the programming languages - this includes the security features that are provided by the language out of the box, research into new versions released and what security concerns they address, what security vulnerabilities exist in the language and how to fix / address those through programming best practices for that particular language etc. Objective C [25 marks] Java [25 marks] Assembly [10 marks] Choose any standalone application out there and if you were to rewrite it in either Objective C or Java, how would you apply the elements researched in section 1 to make the application secure. Provide examples of code to support your answer. [40 marks] Submission Process The report must be submitted via Moodle in week 6
Answered 11 days AfterJun 19, 2021

Answer To: Continuous Assessment - 60% MSCCYB1_JAN20I - MSc in CyberSecurity Secure Programming for Application...

Shubham answered on Jul 01 2021
153 Votes
Question 1
1. Objective C
The security feature of Objective C includes the security features like authorization, access to items and access to the digital certificate. This can provide a user interface element for programs that can be implemented with the security feature for accessing items in key chains. This provides the platform for
key generation that can help in generating a strong pair of key and symmetric key. It can help in exchanging messages that are readable and sign messages with the use of a private key for providing identity. It includes establishment of sessions between server and client for securing the data. It verifies the information with the use of shared secrets without disclosing the secret. The vulnerability issue includes the secure function. The developer should ensure that the size of the buffer should be written largely for avoiding the buffer overflow. The buffer overflow can cause the crash. The crafted overflow can be the cause of malicious code to be executed (Vorobyov, Kosmatov and Signoles, 2018). Attackers can exploit the buffer overflow issue by overwriting the memory of the application. The changes done in the execution path of the program and trigger can respond to the damage file. This will help attackers in understanding the memory layout of the program by feeding the input to the buffer that cannot be stored. It can exploit payload and gain control over the program. Stack-based buffer overflow attack can be common and it can leverage stack memory that exists during the execution time of the function. Heap- based attacks can be carried out and it includes the flooding of memory space allocated for programs beyond the memory that are used for current runtime. The elimination of buffer overflow issues requires elimination of a code base that requires consistent detection and familiarity for securing practice for buffer handling. It can be an easy way to prevent the vulnerability with the use of direct access to memory. It can be a secure practice for handling buffers along with string handling functions.
2. Java
Java is the object-oriented programming language and it provides a salient feature. It includes security features for running inside the virtual machine. The byte-code verifier can help in checking the code fragments for illegal code that can violate the accessing rights to the object. The use of security APIs can lead to security. It contains a cryptographic authentication protocol and algorithm that can help in securing the communication. The security management is responsible for checking properties and permission of the class. It will help in monitoring system resources for accessing the authorized classes. It includes memory management that can help in managing the memory. Compile-time checking can be the way for getting access to the private variables and it reduces the compile time error for preventing the system from crashing. Cryptographic security can help in providing security and the class can help in maintaining the source information that provides guarantees for keeping the digital signature. Exception handling is the feature that can help in adding security and reduces the error. Code injection is the attack type that consists of injecting code that is executed by an application. It can exploit the poor handling of untrusted data. This type of attack can be made possible because of a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here