Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.
Attach your WORD doc and then hit SUBMT.
Week 3:
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Week 4:
Read the section in this week’s reading assignment on secure passwords.
Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 word
Week 5:
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
1. Prohibit guessable passwords
· such as common names, real words, numbers only
· require special characters and a mix of caps, lower case and numbers in pws
· Reauthenticate before changing passwords
· user must enter old pw before creating new one
· Make authenticators unforgeable
· do not allow email or user ID as password
Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Add additional criteria as you see necesarry.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.
Attach your WORD doc and then hit SUBMT.
Week 6:
Do a bit of research on JSON and AJAX.
How do they relate to the the Same-Origin policy?
Using WORD, write several short paragraphs on each. A total of 200-300 words.
Use your own words and do not copy the work of another student.
Attach your WORD document here.
Week 7:
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method.
Use your own words and supply references.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
Week 8:
You are the web master of a college website. You share a server with other school departments such as accounting and HR.
Based on this chapter, create at least five rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule.
Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
Week 9:
N/A
Week 10:
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
· Who is likely to attack your site?
· When are attacks likely to occur?
· What sort of attacks might take place?
· How can you best minimize attacks and protect the integrity of your site?
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
Week 11:
Do a bit of research on penetration testing techniques. Investigate and document the following
· Five network penetration testing techniques
· Advantages and disadvantages of each
· One notable social engineering test
· Possible negative implications of penetration tesing
Please write between 200 and 300 words
Week 12:
Do some research on Threat Response software. Find one particular software package to investigate.
· What does the software do?
· What are it’s major features?
· What kind of training is required?
· How much does the software cost?
Do not do the same software as everyone else.
Write 200-300 of your own words and submit in a WORD document here.
Week 13:
Research the Dark Web.
Write a brief Discussion on the following topic: How can the Dark Web be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
Final Project
1.) Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
2.) Project abstract. In Word Document.
3.) final paper
4.) power point presentation with at least 15 slides