ASC Assignment 2024
ASC Assignment 2024
ASC Assignment 2024
1. Justify the design of secure software based on the given scenario. (A4,PLO5)
2. Propose a solution using secure software concepts and requirements to solve relevant
problems and vulnerabilities of the system. (A5,PLO9)
Instructions:
No marks will be awarded for the entire assignment if any part of it is found to be copied directly
from printed materials or from another student. All submissions should be made on or before the
due date. Any late submissions after the deadline will not be entertained. Zero (0) mark will be
awarded for late submission unless extenuating circumstances are upheld.
Questions:
You are required to design and develop a system individually for your assignment.
The Scenario
You are required to develop any of the system that could be client- server system, stand alone
system or a mobile application where the aim of the system is to achieve the security goal. Security
is the ability of a system to protect information and system resources with respect to confidentiality
and integrity. One of the best practices to help and organization to protect their system and to
safeguard the personal information of the client is the implementation of secure coding during the
system development. Secure system is frequently associated with three core areas, which can be
conveniently summarized by the acronym "CIA":
In your documentation you need to research and implement three secure coding features for the
system. In your research and system implementation you will need to cover the following:
• Research and understand the processes involved in the system that you are going to develop
and design the system by considering all the requirements and security features that going
to be implemented.
• Analyse and discuss the common vulnerability of the similar system. Highlight only 3
vulnerabilities of the system.
• Research and analyse the possibility of exploitation that might occur to the system due to
the vulnerability as stated above.
• Develop the system by implementing three (3) Secure coding concept in your codes
• Discuss on the purpose(s) and the importance (advantages) of the secure coding that you
implemented to the system
• Give three scenarios and explain the impact if the chosen secure coding is not being
implemented.
You may develop a system by using any programming language but preferable to use python
programming language.
Assesment
This assignment will contribute 50% towards the incoure marks,as mentioned on the Student
Assesment &Information sheet
Marking Criteria
Secure software concepts,
requirements, and design (30)
Program demo and presentation
(10)
Research on system vulnerability
and exploitation (30)
Secure coding implementation,
the importance and explanation
(30)
Total marks (100)
Document the results of your work in a professional and systematic manner, in the form of a
computerized report. One (1) softcopy of your documentation is to be submitted.
Submission requirements
2. Your report must be typed using Microsoft Word with Times New Roman font. You need to
include a word count at the end of the report (excluding title, source code of program &
contents pages) Report should be in 1.5 spaces.
3. The report has to be well presented and should be typed. Submission of reports that are
unprofessional in its outlook (disorganised, inconsistent look) will not fair well when marks
are allocated.
4. The report should have a one (1”) margin all around the page as illustrated below:
1 inch 1 inch
1 inch
1 inch
1 inch
1 inch 1 inch
5. Every report must have a front cover. The front cover should have the following details:-
a) Name
b) Intake code.
c) Subject.
d) Project Title.
e) Date Assigned (the date the report was handed out).
f) Date Completed (the date the report is due to be handed in).
6. All information, figures and diagrams obtained from external sources must be referenced using
the APA referencing system accordingly.