Categories
Writers Solution

Input Validation and Business Logic Security Controls

Homework details: Input Validation and Business Logic Security Controls

Overview:

This homework will demonstrate your knowledge of testing security controls aligned with Input

validation and business logic. You will also use the recommended OWASP testing guide reporting format

to report your test findings.

Assignment: Total 100 points

Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions

or discussion:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

 The OWASP site list multiple approaches and examples for blackbox testing reflected XSS

vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and

describe 4 different examples that could be used for testing. Be sure to conduct additional

research for each example to provide your own unique test example. This most likely means you

will need to conduct some research on Javascript to make sure your syntax is correct.

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

 The OWASP site list multiple approaches and examples for blackbox testing Stored XSS

vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2

different examples that could be used for testing. Be sure to conduct additional research for

each example to provide your own unique test example. This most likely means you will need to

conduct some research on Javascript to make sure your syntax is correct.

3. Testing for SQL Injection (OTG-INPVAL-005)

 SQL Injection remains a problem in applications yet could easily fixed. The following SQL

statement is in an HTML form as code with the $ variables directly input from the user.

SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’

Would a form or application that includes this code be susceptible to SQL Injection? Why?

What specific tests would you perform to determine if the applications was vulnerable?

How would you fix this problem? Be specific be providing the exact code in a Language of your choice.

(e.g. Java, PHP, Python …)

4. Test business logic data validation (OTG-BUSLOGIC-001)

 While reviewing some Java code, an analysis provided the following code snippets that contain

logic errors. For each example, describe the issue and provide code that would fix the logical

error:

a.

2

int x; x = x + 1; System.out.println(“X = ” + x);

b.

for (i=1; i<=5; i++) ; { System.out.println(“Number is ” + i); }

c.

if ( z > d) ; { System.out.println(“Z is bigger”); }

d.

String m1=”one”;

String m2=”two”;

if(m1 == m2) {

System.out.println(“M1 is equal to M2”);

}

e. The formula for the area of a trapezoid is:

A = (b1+b2)/2 * h

The following Java code is the implementation. Fix the logical error

double area;

double base1 = 2.3;

double base2 = 4.8;

double height = 12.5;

area = base1 + base2/2.0 * height;

Demonstrate your fixed code work as anticipated with a couple different test

cases.

5. Test integrity checks (OTG-BUSLOGIC-003)

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In

your own words describe and provide 2 unique examples of integrity checks. For your

examples, provide specific testing methods for each case.

6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)

3

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In

your own words describe and provide 2 unique examples of circumvention of work flow. For

your examples, provide specific testing methods for each case.

You should document the results for the tests and your comments, and recommendations for improved

security for each security control tested in a word or PDF document. Discuss any issues found and

possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, include all

references used and contain minimal spelling and grammar errors.

Grading Rubric:

Attribute Meets

Reflected Cross site scripting

10 points Describes Reflected Cross Site scripting. Then, Lists and describes 4 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

Stored Cross site scripting

10 points Describes Stored Cross Site scripting. Then, Lists and describes 2 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

SQL Injection 25 points Answers: would a form or application that includes this code be susceptible to SQL Injection? Why? Answers: What specific tests would you perform to determine if the applications was vulnerable? Answers: How would you fix this problem? Provides the exact code in a Language of your choice.

Business logic data validation

15 points For each example, describes the issue and provides code that would fix the logical error.

Integrity checks 10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describes and provides 2 unique examples of integrity checks. Provides specific testing methods for each case.

Defenses against workflow intervention

10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describes and provides 2 unique examples of circumvention of work flow. Provides specific testing methods for each case.

Documentation and Submission

20 points Your document should be well-organized, include all references used and contain minimal spelling and grammar errors

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Input Validation and Business Logic Security Controls
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Input Validation and Business Logic Security Controls

Homework 4

Input Validation and Business Logic Security Controls

Overview:

This homework will demonstrate your knowledge of testing security controls aligned with Input

validation and business logic. You will also use the recommended OWASP testing guide reporting format

to report your test findings.

Assignment: Total 100 points

Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions

or discussion:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

 The OWASP site list multiple approaches and examples for blackbox testing reflected XSS

vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and

describe 4 different examples that could be used for testing. Be sure to conduct additional

research for each example to provide your own unique test example. This most likely means you

will need to conduct some research on Javascript to make sure your syntax is correct.

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

 The OWASP site list multiple approaches and examples for blackbox testing Stored XSS

vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2

different examples that could be used for testing. Be sure to conduct additional research for

each example to provide your own unique test example. This most likely means you will need to

conduct some research on Javascript to make sure your syntax is correct.

3. Testing for SQL Injection (OTG-INPVAL-005)

 SQL Injection remains a problem in applications yet could easily fixed. The following SQL

statement is in an HTML form as code with the $ variables directly input from the user.

SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’

Would a form or application that includes this code be susceptible to SQL Injection? Why?

What specific tests would you perform to determine if the applications was vulnerable?

How would you fix this problem? Be specific be providing the exact code in a Language of your choice.

(e.g. Java, PHP, Python …)

4. Test business logic data validation (OTG-BUSLOGIC-001)

 While reviewing some Java code, an analysis provided the following code snippets that contain

logic errors. For each example, describe the issue and provide code that would fix the logical

error:

a.

2

int x; x = x + 1; System.out.println(“X = ” + x);

b.

for (i=1; i<=5; i++) ; { System.out.println(“Number is ” + i); }

c.

if ( z > d) ; { System.out.println(“Z is bigger”); }

d.

String m1=”one”;

String m2=”two”;

if(m1 == m2) {

System.out.println(“M1 is equal to M2”);

}

e. The formula for the area of a trapezoid is:

A = (b1+b2)/2 * h

The following Java code is the implementation. Fix the logical error

double area;

double base1 = 2.3;

double base2 = 4.8;

double height = 12.5;

area = base1 + base2/2.0 * height;

Demonstrate your fixed code work as anticipated with a couple different test

cases.

5. Test integrity checks (OTG-BUSLOGIC-003)

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In

your own words describe and provide 2 unique examples of integrity checks. For your

examples, provide specific testing methods for each case.

6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)

3

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In

your own words describe and provide 2 unique examples of circumvention of work flow. For

your examples, provide specific testing methods for each case.

You should document the results for the tests and your comments, and recommendations for improved

security for each security control tested in a word or PDF document. Discuss any issues found and

possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, include all

references used and contain minimal spelling and grammar errors.

Grading Rubric:

Attribute Meets

Reflected Cross site scripting

10 points Describes Reflected Cross Site scripting. Then, Lists and describes 4 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

Stored Cross site scripting

10 points Describes Stored Cross Site scripting. Then, Lists and describes 2 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

SQL Injection 25 points Answers: would a form or application that includes this code be susceptible to SQL Injection? Why? Answers: What specific tests would you perform to determine if the applications was vulnerable? Answers: How would you fix this problem? Provides the exact code in a Language of your choice.

Business logic data validation

15 points For each example, describes the issue and provides code that would fix the logical error.

Integrity checks 10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describes and provides 2 unique examples of integrity checks. Provides specific testing methods for each case.

Defenses against workflow intervention

10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describes and provides 2 unique examples of circumvention of work flow. Provides specific testing methods for each case.

Documentation and Submission

20 points Your document should be well-organized, include all references used and contain minimal spelling and grammar errors

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Input Validation and Business Logic Security Controls
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Create a Data Validation list in cell J7 based on the employee IDs located in the range A6:A25

After graduating from college, you and three of your peers founded the software company TechStore Unlimited (TSU). TSU provides an online market place that fosters business to business (B2B), business to consumer (B2C), and consumer to consumer sales (C2C). As one of the company’s principal owners, you have decided to compile a report that details all aspects of the business, including: employee payroll, facility management, sales data, and product inventory. To complete the task you will duplicate existing formatting, import data from an Access database, utilize various conditional logic functions, complete an amortization table, visualize data with PivotTables and Power Maps, connect and transform several external data sources, and lastly you will inspect the workbook for issues.

Start   Excel. Open 3rd Excel Exam SU1 2021.xlsx. Grader has automatically added   your last name to the beginning of the filename.

Create a Data Validation list in   cell J7 based on the employee IDs located in the range A6:A25. Add the Input   Message Select Employee ID and use the Stop Style Error Alert.
  Hint: Data Validation is located on the Data tab in the Data Tools group.
 

In cell K7, enter an INDEX   functions with two nested MATCH functions. The first MATCH function will look up the row number of the employee   number in cell J7 in the range A6:A25. The second MATCH function will look up the column number of the value   in cell K6 in the range B5:H5. Note   K6 contains a validation list that can be used to select various lookup   categories.
 

  Hint: The arguments of the INDEX are array (B6:H25), Row Number,Column   Number. The purpose of the two MATCH   functions is to look up the ROW number and COLUMN number. I suggest you do the first MATCH function   to ensure it works and then nest it inside of the INDEX function. Then nest the second MATCH function in the   INDEX function. To test the INDEX   function, use the Data Validation list in cell J7 to select Employee_ID 31461 and select Salary in cell K6. Did it   look up the correct salary for the specified employee number?
 

Click cell K11 and type FT. Click cell A28 and type Full Time   Employees.

Use the Format Painter to apply   the formatting from the cell A3 to the range A28:B28.
 

  Hint: The Format Painter is located on the
  Home tab in the Clipboard group.

 

Use Advanced Filtering to   restrict the data to only display FT employees based on the criteria in the   range K10:K11. Place the results in cell A29.
 

  Hint: Advanced Filtering is located on the Data tab in the Sort & Filter   group.
 

Enter a database function (DCOUNTA)   in cell K18 to determine the total number of FT employees. To complete the   function, use the range A5:H25 as the database argument, cell E5 for the   field, and the range K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function in   cell K19 (DSUM) to determine the total value of FT employee salaries. To   complete the function, use the range A5:H25 as the database argument, cell H5   for the field, and the range K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function   (DAVERAGE) in cell K20 to determine the average FT employee salary. To   complete the function, use the range A5:H25 as the database argument, cell H5   for the field, and the range K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function in   cell K21(DMAX) to determine the highest FT salary. To complete the function,   use the range A5:H25 as the database argument, cell H5 for the field, and the   range K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Format the range K19:K21 with   Currency Number Format.
 

  Hint: Currency Number Format is located on the
  Home tab in the Number Group.

 

Use PowerQuery to connect and   open the Orders table in the eApp_Cap_Orders.accdb   database. Use the Query editor to format column A with Date number format and   load the table. Rename the worksheet Orders.
  Hint: Data can be imported using Get & Transform data tools located on   the Data tab in the Get & Transform data group.
 

Adapt the previous step to   connect and load the Warehouse table.
 

  Hint: Data can be imported using Get & Transform data tools located on   the Data tab in the Get & Transform data group.
 

Connect to, but don’t load the   Inventory table from the eApp_Cap_Orders.accdb   database. 

Create the following   relationships.
 

  Relationship 1
  Table Name
  Inventory
 

  Column (Foreign)
  Warehouse
 

  Table
  Warehouse
 

  Column (Primary)
  Warehouse
 

  Relationship 2
 

  Table
  Orders
 

  Column (Foreign)
 

  Item_Number
  Table
  Inventory
 

  Column (Primary)
 

  Item_Number
 

  Hint: Relationships are located on the Data tab in the Data Tools group.
 

Use PowerPivot to create a blank   PivotTable on a new worksheet. Add the following fields to the PivotTable.
  Rows
  Warehouse: Location
  Warehouse: Warehouse
  Inventory:
  Item_Number
  Values
  Inventory:
  Current_InventoryInventory:
  Total_Value

Insert a Slicer based on   Warehouse. Place the upper left corner of the Slicer inside the borders of   cell F3.
 

  Hint: Slicers are located on the Insert tab in the Filters group.
 

Create a 3D PowerMap that   displays the location of all warehouses based on the City geographic type.   Rename the worksheet Inventory.
  Hint: 3D Maps is located on the Insert tab in the Tours group.
 

Save and close the 3rd Excel   Exam SU1 2021. Go to the Test   Presentation Window. Upload the exam   and submit it for grading 

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Create a Data Validation list in cell J7 based on the employee IDs located in the range A6:A25
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Design for a small Web site: HTML data validation

Develop a 5-6 page Word document that describes the design for a small Web site that meets the following specifications.
The Web site includes four or more Web pages designed according to current usability guidelines.
One page must be the Home page.
One page must be a subscription page that allows the user to become a member or subscribe to your organization and performs HTML data validation.
The Web site must incorporate the use of the following:
Images and Audio
At least one table (NOT for page layout)
At least one form
Navigation
Other valid HTML elements
Produce a cohesive site that is easy to navigate.
The Web site must include external CSS used to format and layout each Web page.
Validate the HTML in each Web page.
Validate the CSS style rules in each CSS.
The design document must include details about your design, technologies employed, potential challenges and explanations regarding your validation process. Include a title page.
Add the design document to the Visual Studio Web site folder.
Submit the Word Design document and the Web site into a .zip file.
Please add your file.
You will be graded on the design and functionality of the Web site. You will be graded on the usability of the Web site. You will be graded on the ability to include the required Web pages and the required HTML elements in the Web site. You will be graded on the use of CSS to format and layout Web pages. Points will be deducted for a missing or incomplete site plan. Points will be deducted for missing required Web pages. Points will be deducted for any missing required elements and/or attributes. Points will be deducted for any HTML or CSS validation errors including any missing accessibility requirements.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Get Professionally Written Papers From The Writing Experts 

Why work with us?

Confidentiality:  

We value you data. Our company is extremely efficient in guarding the privacy of our clients

 

 Authenticity:

All of our papers are authentic, as each paper of ours is composed according to your unique requirements. .  

. 24/7 Support:  

Our team members are available via email, live chat, and phone.  

Revision Policy:  

You can apply for a revision if you think your paper could be better. In this case, your paper will be revised either by the specialist assigned to you or by another writer.

 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

Create Form Validation using jQuery library

Department of Foundation and Pathways Swinburne University of Technology
COS10024 – Web Development Week 10 – Tutorial Activity 2
Lab 10 – jQuery
Aims
• To practice how to use a JavaScript framework such as jQuery to enhance user interaction.
• To review JavaScript functions and control structure.
Task 1: Create Form Validation using jQuery library (2 Marks)
Description: This lab is to demonstrate the use of jQuery.
Part 1: Based on a registration form, implement the JavaScript functions for client-side form data validation using jQuery.
Part 2: Create a section collapse effect for the Account Information and User Information sections of the registration form.
Part 3: Modify the validation function to use an HTML+CSS pop window (similar to Lab 8).
A simple preview of the web page to implement in this lab is presented in Figure 2 on page 6.
Note: A gif file named objective.gif that presents what to achieve in this lab can be found in lab_10_files.zip which is available on Canvas.
Design:
The design process starts with discussion and paper drawings. Ensure this process is completed before implementation.
Step 1: Form Creation and Presentation (HTML and CSS)
The design presented in Figure 1 will be used.
1.1 Add a “[-]” symbol beside each input section for the user to click to collapse the section. Once a section is collapsed, it should display [+] to expand the input section.
Step 2: JavaScript Implementation
2.1 Identify which what form data should be evaluated and what rules should apply.
Answer: We need to evaluate all input fields. The rules are:
Rule 1: All input fields must not be empty;
Rule 2: User ID must be a valid email address. Thus, it must contain a ‘@’ symbol; Rule 3: Password and Retype Password must have the same value; and Rule 4: Name must be letters and spaces only.
Implementation
Implementation requires the creation of HTML, CSS and JavaScript files. In this lab, we will use the HTML and CSS files created in Lab 8. Those files are available in lab_10_files.zip on Canvas.
Step 3: Directory Set Up
3.1 Create a new folder ‘lab10’ under the unit folder on the mercury server ~/COS10005/www/htdocs. This is the directory where all files will be uploaded.
Step 4: HTML Creation
4.1 Using NotePad++ (or SubLime Text for Mac users), open file regform2.html.
4.2 Review the HTML code and locate comments #1 – #6 and add missing HTML code as required. For your convenience, the basic code and additional code is shown below:
Step 5: CSS Creation
5.1 Open files regform2_desktop.css and modal.css. Review the CSS code, no changes will be made to these files in this lab.
Step 6: Form Data Validation Using jQuery
6.1 Open file validation.js, convert the existing code to use jQuery as shown below. Note: Replace ‘struck out’ code with the red code shown below


Assignment status
Solved by our Writing Team at 
CapitalEssayWriting.comCLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com