Module Learning Outcomes Assessed
- Critically evaluate a range of encryption and authentication methods for a given set of requirements.
- Utilise systematic knowledge to create secure environments at the host or network level.
- Develop and evaluate software that addresses the most common and most severe security concerns.Task and Mark Distribution
In this coursework you are required to design and develop a simple web application. You will need to implement security features for the application.
The coursework has two components:
- Design and develop the web application, based on the requirements below.
- A Report on the security considerations in the website design. This should present your design, and discuss and justify any design decisions made with regard to security.
There will be a template site with the basic functionality made available. You are free to use this as a starting point.
You have been asked to develop a simple E-Commerce site. Customers can:
The platform should support.
Allow users to create an account
Require Users to Login before purchasing or reviewing products
Admin Account allowing:
All users to be viewed
New items to be created.
You are free to add other user levels as required.
Registered users can review products.
The Site owners would like the users to be able to have a range of formatting options, supporting HTML or similar markup.
Logging and Analytics
The owners would also like some form of logging and analytics to help understand page views by registered users. You should design and justify your design choices.
IMPORTANT: You are not expected to implement any analytics infrastructure. However, you should justify the data collected, and the ollection method.Report Requirements
The report should be written in a style suitable for a technical audience.
The report should provide details of the design of the system, and the security based decisions behind it.
You should supply code examples for the security related elements of the design.
You are expected to justify your design choices by referring to the relevant literature
A suggested report structure is as follows:
Scope of the report, design overview
An overview of the design for the site, and details of the security considerations.
Discussion of potential security issues for each element of the design.
Recommendations for dealing with potential security / data protection issues with the proposed designs requirements.
There is also an element in the marking scheme for Background Research. While I am not expecting a full literature review, you should
support your design decisions using the relevant literature.
For Example. When discussing the Login Functionality you might want to discuss:
Session Management Strategies, and their impact on security
Password Management and Storage
Details of any levels of user access implemented.
Source code examples showing how you have addressed the problems identified in the design phase.
NOTE: You don’t need to supply the full source code in the body of the report. Show just the relevant code for each element.
highlighting the issues resolved, and the key findings of the report.
You are marked on the functionality of the system, rather than its look and feel. The site should be usable via a web browser. Other than that the choice of infrastructure is up to you.
Your final report in PDF Format by the submission date.Marking.
Report (100%): Justification for the design choices, with implementation examples
本网站支持 Alipay WeChatPay PayPal等支付方式
E-mail: email@example.com 微信号:vipnxx