Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
App Development to Demonstrate Cyber Security Triad

APK University’s students are complaining of having some difficulties using the Multi-factor Authentication (MFA) system of access in student’s portal as well as slow access to their records during peak working hours of the day. In order to solve these problems, the University management has contracted you to:

  1. Redesign the portal’s user authentication/access management page to use password-less authentication system (you can use any of these approaches/use cases: KBA, PFA, IFA).
  2. Help them migrate their data storage system from premised to cloud-based storage.

Instructions:

(1) You are to use preferable Python programming language and any IDE of your choice.

(2) Properly comment your lines of code to make them readable and easy to follow.

(3) Use cloud-compute resources for coding and data storage but can have your user access management table on-premised using Sqlite and DB Browser if you like. Also show implementation using these resources through screen shots in the written report in

(4) Copy and paste the codes and screen shots of the Table in Appendixes of your report in Task 2. PLEASE DO NOT submit a zipped file.

(5) Submit a video demo or link from OneDrive to the video demo where appropriate of your app showing how the app works alongside the functionalities as stipulated in Task 2.

It will be good to also explain your lines of codes before running the app. If you are submitting a link, first save the video in OneDrive and copy the link.

Note that students are not expected to build a full solution, rather an app demonstrating confidentiality, integrity, authenticity, and availability with potentials of implementing non-repudiation as future work.

  1. Build an app that uses any password-less authentication use case.
  2. An app that has at least two menus: (1) Adding and (2) Viewing/Retrieve a student file/record
  3. To add student record:
  • User gains access to the app through password-less authentication method
  • User fills a form and attaches credential(s), then submits the form
  • By clicking submit button, the app generates an encryption key and unique ID
  • Displays the unique ID and uses either block/stream cipher to encrypt the file (credential(s)) and thus generating a ciphertext
  • Generates hash values of the ciphertext and unique ID
  • Stores the ciphertext in a cloud storage bucket
  • Saves the encryption key and hash values in a premised table
  • User types in the unique ID
  • Requests to view record/download/retrieve file
  • Retrieves the hash values of this unique ID from premised table
  • App retrieves the ciphertext from the cloud if the hash values match
  • Retrieves the encryption key associated with this unique ID
  • Decrypts the ciphertext
  • Performs file checksum and if TRUE
  • Provides the file/record for viewing/download
  • Else file/record is corrupt and cannot be displayed/downloaded

This a reflection of the effort required for the assessment. Word counts will normally include any text, tables, calculations, figures, subtitles and citations. Reference lists and contents of appendices are excluded from the word count. Contents of appendices are not usually considered when determining your final assessment grade.

App development to demonstrate the cyber security triad – Confidentiality, Integrity and Availability with future works in the area of Authenticity and Non-Repudiation.

support
close