G6077 Python

Java Python Introduction to Computer Security – G6077

Weighting: 50% of marks for the module
Version Information: Oct 2024
Submission deadline: Check deadline on Sussex direct. e-submission to Canvas

You must work on this assignment on your own. The standard Informatics rules for collusion, plagiarism and lateness apply. Any cases of potential misconduct discovered will be reported and investigated.

Part A – Virtual Private Cloud (10 marks)
Use the AWS services to implement the infrastructure given below. Once you implement this, you will need to take screen shots of your settings to provide it in the report.


Part B (90 marks)

Lovejoy’s Antique Evaluation Web Application

In this part of the coursework, you will develop a secure web application for a local antique dealer named Lovejoy. Lovejoy wants a minimum viable product allowing customers to register and then request evaluations of potential antique objects. Lovejoy has many rivals in the antique business who may sometimes resort to underhand tactics and so is very concerned about the security of the application.
Your secure web application will need to have these features for the minimum viable product (MVP) release: user registration and login, a password policy, “request evaluation” page and then an extension of the “request evaluation” page file upload to allow upload of photos. Finally, Lovejoy needs a request listing page.
You should build Lovejoy’s MVP focusing on the following features in each task. Mark allocation for each task are as described below and in the security analysis grid. You should reflect upon your work and provide estimates of how much you’ve achieved by filling out the marking grid. An example of self-reflection is provided in the Canvas. There are thus 30 marks for completing the application reasonably, 50 marks for the security features identified and implemented, and 10 marks for self-reflection and video quality.
You have a choice of technologies from which to build the application:
PHP
Java
Python
No other approach is allowed. If you are using Java and Python, you should research it yourself to find out where you want to host it.

Task 1 - Develop a secure web form that allows customers to register in the application. They must register an email address, password, name and contact telephone number. The users’ details should be stored in a database.
Code Quality 5 marks
Database Design 5 marks

Task 2 - Develop a secure login feature.
Code Quality 5 marks

Task 3 – Extend the password management feature to provide password strength recommendations and password recovery.
Code Quality 5 marks

Task 4 - Implement a “Request Evaluation” web page only accessible to logged in users. This web page should have a comment box to type in the details of the object and their request, and a dropdown box for preferred method of contact between phone or email. The evaluation page should allow for file upload of a photo of the object.
Code Quality 5 marks

Task 5 – Implement a page that displays a list of evaluation requests. This page should only be visible to an administrator role. Code Quality 5 marks

Submission guidance
You are only submitting the report to the Canvas. You must follow the report template.
Report -- You must use the report template provided at the end of this coursework description. In your report, you will provide screenshots of all the marking criteria elements and annotate where necessary. In screen shots for the code, please don’t give a big chunk of code, provide only the related lines. Use bullet points to give any explanation, please don’t write big paragraphs.

Recording -- You will use Sussex Panopto to record a video to show the working of your application and its security features. Useful links provided at the end about Panopto. It is a very straightforward tool to use. You log in using University credential, select the right screen, and record the application to show different features. Show us the aspects that cover marking criteria. Consider the following when recording.
1) Recording must not be more than 10 minutes.
2) Must show the testing of all tasks in sequence (features) and its security features
3) Provide voice over or textual application on the video to explain the recording.
4) Record screen and yourself in the video.
5) Use the self-reflection grid in the task 0 to show the order of recording features.
When you record the video, from the settings, there is a share link button, click on it and select the option that anyone at our organisation who has the link can access the video. Copy that link and put it in your report. 
How to use Panopto?
Recording presentation using Panopto

More guidance about recording the video will be provided in the Canvas.

Code file location (OneDrive)-- Upload your code to the OneDrive and provide the code link in the report for our inspection.
Select the folder where you have all the code, then click on the share option. In the settings, click on the pencil drop down menu and select the option can edit. Copy the link and put it in your report.
See the recording on the Canvas how to setup this in a correct way.





Excellent (10-9 marks) Good (8-6 marks) Average (5-3 marks) Poor (2-0 marks)
10 marks
Criteria (50 marks)

Excellent (15-13) Good (12-10) Average G6077、Python (9-5) Poor (4-0) 15 marks
Policy has no flaw, and its implementation is excellent. Various mechanisms implemented to ensure password policy is secure. Policy has no flaws, but implementation of policy is simple. Password policy has very few flaws. However, different sections of policy are implemented and working. Policy has many flaws for example password is not encrypted, and no salt applied. Password forgot policy has security flaws. Password policy 15marks
Password entropy, encrypted storage, security questions and recovery of password

Several countermeasures are implemented, and the quality of countermeasures are excellent. Countermeasures are implemented in all the pages however quality of implementation is simple. Implemented countermeasures only in some parts of the application.
Very little effort to implement countermeasures to avoid these vulnerabilities.
Vulnerabilities 15 marks
SQL injection, XSS, CSRF, File Upload and any other obvious vulnerability.
All the requirements are implemented to authenticate users. Implementation quality is excellent. All requirements are implemented to authenticate the user. However, quality of implementation is simple. Only some obvious requirements are not implemented. Lots of obvious authentication’s requirements are not implemented. Authentication and Encryption 10 marks
User identity management (registration and login etc), Email verification for registration, 2 factor authentications (PIN and or email)
Encryption applied reasonably to secure assets
Excellent implementation of countermeasures against these attacks. No flaws in countermeasures however quality of implementation is simple. Some flaws in countermeasures Very little effort against these attacks. Obfuscation/Common attacks 10 marks
Brute force attack – Number of attempts
Botnet attack – Captcha
Dictionary attack/Rainbow table attack
5 marks 5 marks 5 marks 5 marks 10 marks 30 marks
List evaluation-Task5 Request evaluation – task 4 Forgot password-Task3 Login-Task2 User registration/Database-Task1 Features of webs application

Up to 4/6 marks 0 marks 10 marks
Fairly fully completed Marking not completed Self-reflection – 4 marks
Covered everything in order Missing aspects Video quality – 6 marks

Excellent (9 to 10) Good (6 to 8) Average (3 to 5) Poor (0-2) 10 marks
Everything is implemented as in the infrastructure Very little mistakes in the implementation Few mistakes in implementation Very little attempt. Virtual Private Cloud & Security groups

Report
You will be submitting this report to the Canvas. The report has 6 tasks. From 1 to 5, it covers the secure application part and the last task 6 covers the AWS. You will provide the three required links below.
1)Code file Location: --------------------------------------
Upload your code to OneDrive and provide a link here. Set up correct permission so that anyone with a link can view it.
2)Panopto recording:------------------------------------------
If you don’t provide this, we will not be able to test your work fully.

If any of the above evidence is not provided, you will lose marks as I will not be able to test your application.
Task 0 – Self-reflection
Marking grid filled up by you. Fill it up and past it here. We expect you to self-assess yourself fairly.
Marking criteria Sub criteria Tick/cross Marks
(from the main marking grid, assign fair marks to yourself)
Password policy Password entropy

Security questions
Password recovery
Vulnerabilites SQL injection,


XSS,
CSRF,
File Upload and
any other obvious vulnerability.
Authentication/Encrypted storage User registration, User login
Email verification for registration,
2 factor authentications (PIN and or email)
Encrypted storage
Obfuscation/Common attacks Brute force attack – Number of attempts
Botnet attack – Captcha
Dictionary attack/Rainbow table attack
Features of web application Database design
User registration
User login
Forgot password
Evaluation
List evaluation
VPC Evidence provided
Video All the marking criteria covered
Self-reflection This marking grid fill out properly
Total marks =

Task 1 – User registration
Registration feature code screenshots

Database Table

Why do you think it is secure? Use bullet points to provide your reasons and back it up with code snippet from your application. Don’t paste the big junks of code in the report, show us those specific lines, highlight, and annotate if you need to.

Task 2 - Develop a secure login feature.
Login feature code screenshots

Why do you think it is secure? Use bullet points to provide your reasons and back it up code snippet from your application.

Task 3 - Implement password strength and password recovery

List each password policy element that you implemented and back it up with code snippets from your application.

Task 4 - Implement a “Evaluation Request” web page.

Request Evaluation feature screenshot

Why do you think it is secure?

Task 5 – Request Listing Page

Code of the feature

Why do you think it is secure?

Task 6 –AWS Virtual Private Cloud settings screen shots         

【无人机】基于改进粒子群算法的无人机路径规划研究[和遗传算法、粒子群算法进行比较](Matlab代码实现)内容概要:本文围绕基于改进粒子群算法的无人机路径规划展开研究,重点探讨了在复杂环境中利用改进粒子群算法(PSO)实现无人机三维路径规划的方法,并将其与遗传算法(GA)、标准粒子群算法等传统优化算法进行对比分析。研究内容涵盖路径规划的多目标优化、避障策略、航路点约束以及算法收敛性和寻优能力的评估,所有实验均通过Matlab代码实现,提供了完整的仿真验证流程。文章还提到了多种智能优化算法在无人机路径规划中的应用比较,突出了改进PSO在收敛速度和全局寻优方面的优势。; 适合人群:具备一定Matlab编程基础和优化算法知识的研究生、科研人员及从事无人机路径规划、智能优化算法研究的相关技术人员。; 使用场景及目标:①用于无人机在复杂地形或动态环境下的三维路径规划仿真研究;②比较不同智能优化算法(如PSO、GA、蚁群算法、RRT等)在路径规划中的性能差异;③为多目标优化问题提供算法选型和改进思路。; 阅读建议:建议读者结合文中提供的Matlab代码进行实践操作,重点关注算法的参数设置、适应度函数设计及路径约束处理方式,同时可参考文中提到的多种算法对比思路,拓展到其他智能优化算法的研究与改进中。
Python G 代码是一种用于生成和操纵 CNC (Computer Numerical Control) 控制的代码段的方式,主要是通过编写Python脚本来创建、修改以及理解 G 代码文本文件。G代码是用来指导机床和其他自动化工具执行精确运动和操作的指令集。下面是对Python处理G代码的一些常见方式和应用场景的简介: ### Python处理G代码的几种方式 #### 读取和解析G代码 通常,我们可以使用简单的文本处理函数来读取G代码文件,并解析每一行指令。例如,利用字符串分割功能,可以提取每条命令的组成部分(如移动方向、距离、速度等)。对于更复杂的需求,可以利用正则表达式库(`re`)来匹配和解析复杂的G代码模式。 ```python import re with open('gcode_file.gcode', 'r') as file: gcode_lines = file.readlines() for line in gcode_lines: if match := re.match(r'\s*(G\d+)(\s*\d+\.\d+)\s+(\d+\.\d+)', line): # 这里可以处理提取出来的G代码指令和参数 ``` #### 修改G代码 一旦解析了G代码,我们就可以修改其内容。这可能包括改变移动速度、调整路线、添加或删除特定的操作等等。修改后的代码可以保存回文件。 #### 自动生成G代码 Python脚本可以依据用户输入的设计参数自动生成G代码。例如,在CAD软件设计完成后,可以直接调用Python脚本生成对应的加工路径。 #### 验证和模拟 在真实加工前,使用Python脚本来验证G代码是否按预期工作,可以在仿真环境中模拟整个加工流程,确保没有潜在的问题。 ### 应用场景 1. **原型制作**:在快速原型制作或小批量生产中,利用Python脚本生成特定的G代码,可以高效地创建物理原型。 2. **教学**:在教育环境下,教师可以用Python脚本动态演示G代码是如何生成和影响机械动作的。 3. **自动化生产线**:在工业自动化中,Python可以整合各种传感器数据和工艺参数,自动优化G代码以适应实时变化的工作条件。 4. **个性化定制**:允许用户通过图形界面或者API手动或半自动地编辑G代码,以满足特定的产品需求或者客户要求。 总之,Python提供了一种强大的方式来自动化和优化G代码的处理过程,无论是从读取、解析、修改还是生成新的G代码,都大大提高了效率和灵活性。
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值