ASC Assignment 2024

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Advance Software Security CT123-3-3 Page 1 of 3

Learning Outcome of the Assignment

1. Justify the design of secure software based on the given scenario. (A4,PLO5)
2. Propose a solution using secure software concepts and requirements to solve relevant
problems and vulnerabilities of the system. (A5,PLO9)

Instructions:

No marks will be awarded for the entire assignment if any part of it is found to be copied directly
from printed materials or from another student. All submissions should be made on or before the
due date. Any late submissions after the deadline will not be entertained. Zero (0) mark will be
awarded for late submission unless extenuating circumstances are upheld.

Questions:
You are required to design and develop a system individually for your assignment.

The Scenario

You are required to develop any of the system that could be client- server system, stand alone
system or a mobile application where the aim of the system is to achieve the security goal. Security
is the ability of a system to protect information and system resources with respect to confidentiality
and integrity. One of the best practices to help and organization to protect their system and to
safeguard the personal information of the client is the implementation of secure coding during the
system development. Secure system is frequently associated with three core areas, which can be
conveniently summarized by the acronym "CIA":

• Confidentiality -- Ensuring that information is not accessed by unauthorized persons


• Integrity -- Ensuring that information is not altered by unauthorized persons in a way
that is not detectable by authorized users
• Availability – Ensuring that the information must be available when it is needed.

You may develop any of the system as listed below:

• Any Web-Based system that implementing secure web applications.


• A system that able to retrieve system information and alert the user if the system
information is vulnerable to certain kind of threats. The system able to suggest
countermeasures to the users.
• A system that monitoring any command that being running in the operating system and
alert the users if the command is suspicious command. The detection can be based on rule-
based detection, behavior-based detection, or signature-based detection.

In your documentation you need to research and implement three secure coding features for the
system. In your research and system implementation you will need to cover the following:

Level 3 Asia Pacific University of Information Technology and Innovation 2023


Advance Software Security CT123-3-3 Page 2 of 3

• Research and understand the processes involved in the system that you are going to develop
and design the system by considering all the requirements and security features that going
to be implemented.
• Analyse and discuss the common vulnerability of the similar system. Highlight only 3
vulnerabilities of the system.
• Research and analyse the possibility of exploitation that might occur to the system due to
the vulnerability as stated above.
• Develop the system by implementing three (3) Secure coding concept in your codes
• Discuss on the purpose(s) and the importance (advantages) of the secure coding that you
implemented to the system
• Give three scenarios and explain the impact if the chosen secure coding is not being
implemented.

You may develop a system by using any programming language but preferable to use python
programming language.

Assesment

This assignment will contribute 50% towards the incoure marks,as mentioned on the Student
Assesment &Information sheet

This assignment will be evaluated based on the following criteria.

Assessment Criteria (Marks Breakdown)

Student’s Name Student 1

Marking Criteria
Secure software concepts,
requirements, and design (30)
Program demo and presentation
(10)
Research on system vulnerability
and exploitation (30)
Secure coding implementation,
the importance and explanation
(30)
Total marks (100)

Guidelines for the Report:

Document the results of your work in a professional and systematic manner, in the form of a
computerized report. One (1) softcopy of your documentation is to be submitted.

Level 3 Asia Pacific University of Information Technology and Innovation 2023


Advance Software Security CT123-3-3 Page 3 of 3

Your completed documentation should meet the following requirements:

1. Table of contents for every detailed chapter/section.


2. Abstract
3. Introduction
4. Chapters / sections
5. Conclusion
6. Appendices
7. References

Submission requirements

1. Online submission for both system and documentation through Moodle

2. Your report must be typed using Microsoft Word with Times New Roman font. You need to
include a word count at the end of the report (excluding title, source code of program &
contents pages) Report should be in 1.5 spaces.
3. The report has to be well presented and should be typed. Submission of reports that are
unprofessional in its outlook (disorganised, inconsistent look) will not fair well when marks
are allocated.
4. The report should have a one (1”) margin all around the page as illustrated below:

1 inch 1 inch
1 inch

1 inch

The Typed Text


1 inch

1 inch

1 inch 1 inch

5. Every report must have a front cover. The front cover should have the following details:-
a) Name
b) Intake code.
c) Subject.
d) Project Title.
e) Date Assigned (the date the report was handed out).
f) Date Completed (the date the report is due to be handed in).

6. All information, figures and diagrams obtained from external sources must be referenced using
the APA referencing system accordingly.

Marking Scheme Rubrics

Level 3 Asia Pacific University of Information Technology and Innovation 2023


Advance Software Security CT123-3-3 Page 4 of 3

Criteria Fail Pass Credit Distinction


Secure software Poor secure Basic secure Good secure Outstanding
concepts, software software software secure software
requirements, and concepts, concepts, concepts, concepts,
design (30) requirements requirements requirements requirements
and design and design and design and design
implemented implemented implemented implemented
Fail Pass Credit Distinction
Poor system System partially Good system Very well system
demonstration or working with demonstration demonstration
the system is not basic that fulfilled with most
working at all, requirements basic advance features
and poor fulfilled. requirements implemented.
Program demo and
presentation Presentation and several Well presented
presentation (10)
done done with very advance with detail and
brief explanation features. Well clear explanation
presented with
detail and clear
explanation
Fail Pass Credit Distinction
Poor and lack of Acceptable Good analysis Very well analysis
research and research and and investigation and investigation
investigation of investigation of are done. Detail are done.
the the research and Outstanding
vulnerabilities of vulnerabilities of investigation of research and
Research on system
the selected the selected the investigation of
vulnerability and
system and system and vulnerabilities of the
exploitation (30)
possible possible the selected vulnerabilities of
exploitation exploitation system and the selected
possible system and
exploitation possible
exploitation
Poor secure Fulfill basic Good secure Advance secure
Secure coding coding requirements of coding coding
implementation, the implementation secure coding implementation implementation
importance and and explanation implementation and explanation and detail
explanation (30) of the codes and explanation of the codes explanation of
of the codes the codes

Level 3 Asia Pacific University of Information Technology and Innovation 2023

You might also like