Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Defense Mechanism for Web-Security Protection
Answered

Choose and Implement a Defensive Mechanism

This coursework is individual and worth 60% of the module total. Your objective is to choose and implement Only one defensive mechanism from the ones listed below, that could be used in the cyber-security field to provide protection against any threat. Describe a use-case scenario of using the defensive mechanism, and provide and a step-by-step implementation and usage guide. The available case studies for defensive mechanisms are:

1. Web-Security protection(for example against SQL-Injection, XSS e.t.c.). In this case study, students need to develop and demonstrate their own web-application that will include a defensive solution for a given threat. For this purpose you could use HTML

(https://www.w3schools.com/html/ ) and PHP (https://www.php.net/ ) languages. Alternatively,  you could use an existing tool or mechanism (install, environmental setup, usage e.t.c.) that provides protection over the web, demonstrate and discuss its effectiveness.

You could choose a software or hardware product that could provide a solution.

Students are required to write a professional report minimum of 2500 words, describing the work they have done and briefly justifying any details regarding the defensive mechanism. They must document all of their steps, commands issued, and console output in the form of a scientific report. The documentation should be thorough enough that your implementation can be replicated step-by-step by a technically competent reader.

Along, with the documentation, you have to provide screenshots describing the use-case and the defensive mechanism. All evidence provided needs to be followed by a supportive narrative.

Those screenshots could include information as:

Networking environment Attacker( e.q. IP address)

ü Tools (GUI/CLI environment) that have been used.

Results that show the effectiveness of the mechanism.

Any other evidence that could be used as a proof of concept.

Students also need to include a short presentation to present their work. For this purpose you need to create a short video (.mp4), duration up to 10 minutes max, that will explain what you have done. Additionally, those who wish they could present to their classmates (via MS-Teams) during the presentation weeks at the end of the semester.

Submission Details

Students will have to submit 3 different FILES:

1. The main report (.doc, .docx, .pdf), that will include the documentation of the coursework in a scientific format.

2. A compressed file (.zip), that will include any source code that has been developed, installation files, link or tools that have been used for the implementation.

3. The presentation video (.mp4),  audiovisual material presenting their work. Alternatively, in case that the size of the video is too big, a YouTube or oneDrive link (in a “presentation_link.txt” file) could be used.

support
close