On successful completion of this module students will be able to
Design and development of a database driven website for a gym. Attached you can find the brief, a sample of how it should look like and some guidelines.
Expectations: This assignment comprises of two components: Part A is the design and development of a database driven website for a gym (worth 60% of the total marks of the Module), and Part B is an evaluation report of 1500 words consisting of reflective commentary on Part A (worth 40% of the total marks of the Module). Both components are one piece of work and will assess all the module learning outcomes. Â
Now âThe Priory Clubâ has contacted SmartTech (Leading IT Company) to go through a security check for the website to project their presence and the services they offer online. The client will also use the website as a contact tool with its customers.
You have been assigned a task to carry out a security analysis of your client website and backend SQL database attached to a website containing possible security vulnerabilities; your answer can make reasonable assumptions.
Reflection and Evaluation Report
Your second task is to write a self-reflective commentary about your journey from looking at website design, development, testing to deployment of techniques.
Having created your website project, you should now write a self-reflective commentary (1500 words) critically reflecting on your project. Your commentary should critically explore the work you have done to produce your project using relevant literature.
Task B is worth 40% of the overall module.
Rationale: We trust more and more inputting our personal information to websites. Although this makes our everyday lives more convenient, it also engenders more vulnerabilities because hacking attacks and security breaches will be more frequent. These attacks can range from serious, large scale attacks to simple ones and from simple ones to the ridiculous and life changing incidents. (Note: web links to most prominent web application security incidents and attacks will be posted on Moodle). In light of those incidents and vulnerabilities, this assignment will encourage you to apply the web application security concepts and identify the web application vulnerabilities by analysing web application components such as PHP and MySQL.
Although you will be guided throughout the module by your lecturer, you can get extra support for your assignment, just make an appointment with the ACE team for any language, research and study skills issues and/or talk, email the Computing ACE expert for any advice on how to approach your assignment. REMEMBER: they are not here to give you the answers!
Specific requirements for the assignment: Adobe brackets or Sublime text-2 and HTML, CSS, JavaScript on the client-side and PHP, MySQL, Mutillidae. Alternatively, you can use a complete server-side technology (e.g âXampp/Lampp) which includes Apache web server, PHP and MySQL.
Background:Â The COVID-19 pandemic renders individuals and society extremely vulnerable in all respects. During this crisis, we all rely, more than ever, on computer systems, mobile devices and the Internet to work, communicate, shop, share and receive information and otherwise mitigate the impact of social distancing. The current situation provides an opportunity to the cyber-crime and vulnerabilities. This virus has rapidly reshaped the way business is being conducted on the web, as buyers and sellers jump on the opportunity to capitalise on global fears, as well as dramatic shifts in supply and demand. Although, this rapid change has increased the Internet citizensâ economy, they continue to experience cybersecurity breaches with one in four businesses detecting a breach during their last few months of operations. The nature of these attacks means that many businesses may not know their IT systems have been breached and how to handle/avoid these attacks.