代码代写|Module: 6005-CEM Security Development Assignment Brief

这是一篇来自英国的关于安全开发的代码代写

Module Learning Outcomes Assessed

In this coursework you are required to design and develop a simple web application. You will need to implement security features for the application.

The coursework has two components:

“Template” Site.

There will be a template site with the basic functionality made available. You are free to use this as a starting point.

Website Requirements

You have been asked to develop a simple E-Commerce site. Customers can:

Review products.

The platform should support.

User Accounts.

Allow users to create an account

Require Users to Login before purchasing or reviewing products

Admin Account allowing:

All users to be viewed

New items to be created.

You are free to add other user levels as required.

Registered users can review products.

The Site owners would like the users to be able to have a range of formatting options, supporting HTML or similar markup.

Logging and Analytics

The owners would also like some form of logging and analytics to help understand page views by registered users. You should design and justify your design choices.

IMPORTANT: You are not expected to implement any analytics infrastructure. However, you should justify the data collected, and the ollection method.Report Requirements

The report should be written in a style suitable for a technical audience.

The report should provide details of the design of the system, and the security based decisions behind it.

You should supply code examples for the security related elements of the design.

You are expected to justify your design choices by referring to the relevant literature

A suggested report structure is as follows:

Introduction

Scope of the report, design overview

An overview of the design for the site, and details of the security considerations.

Discussion of potential security issues for each element of the design.

Recommendations for dealing with potential security / data protection issues with the proposed designs requirements.

There is also an element in the marking scheme for Background Research. While I am not expecting a full literature review, you should

support your design decisions using the relevant literature.

For Example. When discussing the Login Functionality you might want to discuss:

Session Management Strategies, and their impact on security

Password Management and Storage

Details of any levels of user access implemented.

Implementation

Source code examples showing how you have addressed the problems identified in the design phase.

NOTE: You don’t need to supply the full source code in the body of the report. Show just the relevant code for each element.

highlighting the issues resolved, and the key findings of the report.

Important Note:

You are marked on the functionality of the system, rather than its look and feel. The site should be usable via a web browser. Other than that the choice of infrastructure is up to you.

Submission Instructions

Please submit:

Your final report in PDF Format by the submission date.Marking.

Report (100%): Justification for the design choices, with implementation examples

Marking Scheme