AimsThis assignment aims to broaden your study of system and network security; develop writing and presentation skills for cybersecurity topics.The task of this assignment is to study a research topic...

1 answer below »
Aims
This assignment aims to broaden your study of system and network security; develop writing and

presentation skills for cybersecurity topics.
The task of this assignment is to study a research topic in the system and network security. As a result

of the research, you should submit a comprehensive research report and present your work.
The Topics
Explore the security issues and solutions on one of the topics given below:
1. Software-defined networking
2. Smart contract
3. IoT security
4. Federated learning security and privacy
5. Web security
6. Lightweight authentication protocols
7. Cloud security
You should study available materials on the related topic, including research publications,

international standards, and other associated technical materials. Most importantly, you should

comment on the issues and solutions along with the security flaws/weaknesses of the protocol(s),
if any. You should show your understanding of the contents and explain the technology using your

own words, but not simply copying


1 SENG6250 System and Network Security School of Information and Physical Sciences Semester 2, 2022 Assignment 3 (100 marks, 25%) - Due: 30 October, 23:59 Aims This assignment aims to broaden your study of system and network security; develop writing and presentation skills for cybersecurity topics. The task of this assignment is to study a research topic in the system and network security. As a result of the research, you should submit a comprehensive research report and present your work. The Topics Explore the security issues and solutions on one of the topics given below: 1. Software-defined networking 2. Smart contract 3. IoT security 4. Federated learning security and privacy 5. Web security 6. Lightweight authentication protocols 7. Cloud security You should study available materials on the related topic, including research publications, international standards, and other associated technical materials. Most importantly, you should comment on the issues and solutions along with the security flaws/weaknesses of the protocol(s), if any. You should show your understanding of the contents and explain the technology using your own words, but not simply copying. 2 Report (40 marks) Your report must include the following contents: 1. Title 2. Author 3. Abstract 4. Introduction: give the background of the addressed topic and describe what you want to do in your report. 5. Technical contents (security issues, solutions, strengths/weaknesses of the solutions, etc.) 6. Discussion (comparisons - pros and cons) 7. Conclusion 8. References You do not have to strictly follow the above bullets to define the sections of your report, but you should cover these items in your report. Any content from others’ work should be properly cited. The references should be clear and complete. The page limit for your report is 15, excluding a cover page and references. You may use a suitable format for the report and references, but should use 12 pt font for the main text. Presentation [presentation (40 marks) + question (20 marks)] You need to do a 10-minute presentation about your work, and you will be asked some questions from the panel. Presentation: you need to do a presentation in the extra lecture on 25 October, 2pm – 4pm, week 13. Question: you need to answer the questions from the panel members and the other students. 3 Submission All assignments must be submitted via Canvas. If you submit more than once, then only the latest will be graded. Your submission should be one ZIP file containing: • A PDF file of your research report. • A copy of your presentation slides. The mark for an assessment item submitted after the designated time on the due date, without an approved extension of time, will be reduced by 10% of the possible maximum mark for that assessment item for each day or part day that the assessment item is late. Note: this applies equally to week and weekend days. Plagiarism A plagiarized assignment will receive ZERO marks (and be penalized according to the university rules). Assignment 3 (100 marks, 25%) - Due: 30 October, 23:59
Answered 2 days AfterOct 18, 2022

Answer To: AimsThis assignment aims to broaden your study of system and network security; develop writing and...

Shubham answered on Oct 20 2022
49 Votes
WEB SECURITY
Author:
Abstract
Web security is related to securing servers and websites from online risks. It aims for safeguarding sensitive data by discovering, responding and restricting attacks. It includes security checks that involve scanning URLs for identifying potential malware and vulnerabilities through the website security software. Web security checks and informs users about one risk and provides a solution for addressing. The first step includes ensuring safety for recognizing and preventing the risk. It is important for handling hackers, viruses, spyware and worms. It includes use of HTTPS that uses TLS or SSL for encrypting c
ommunication between server and client. It provides a secure connection that allows the client to be sure that it is connected with the intended server for the exchange of sensitive information. The use of secure context provides with reasonable confidence that the content can deliver secure and potential connection with connect and it does not get compromised by the victim of attack. It provides a solution with a deep level of visibility and ensures control of the web traffic. All the traffic flowing through can be inspected at the application layer for detecting malicious content and it can help in approving traffic that continues to the intended destination. Web security is required for exploration of proprietary and sensitive data that occurs in the variety of ways and ensures safety of the data.
Table of Contents
Introduction    3
Technical contents    4
Security Issues    4
Solution    6
Strength of solution    7
Weakness of solution    8
Discussion    8
Pros    8
Cons    9
Conclusion    10
References    11
Introduction
The study describes web security issues that include authentication issues, XSS attack, security mis-configuration and insecure direct object reference. It includes information about the implementation of web security that can help in protecting systems from disrupting and misdirecting the services. It ensures protection against attackers and provides smooth operation. The web security ensures filtering and monitoring internet traffic that flows between the internet and the application. It provides the protection against attacks that includes cross site tracks, SQL injection, XSS attacks and file inclusion. It comes with a vulnerability scanner that ensures that all the data is examined properly and it can help the security team in addressing critical vulnerabilities. Web security is required for ensuring that valuable information is kept and protected from hackers. It includes multiple factors that ensure security along with different techniques and checkpoint for keeping the data safe. It follows multiple security standards that are required to be highlighted and implemented for keeping hackers away from accessing sensitive data.
Technical contents
Security Issues
The security issue with the web includes unmitigated vulnerability or risk in the system that can be used by hackers and can cause damage to system or data. It includes vulnerability in the software and services connecting the business to the customer along with business people and processes. Web security has been a major problem that should be addressed because it is the effort that can be put into finding the way for exploiting attempts that are inevitable. The web security issues include major parts that include security of the web server and data. It is important to ensure that the server can continue the operation and the information on the server cannot be modified without authorization and the information can be distributed to individual to authorized persons. Securing information can travel between user and web server. It can help in assuring that the information the user supplied to the web server cannot be modified and read. Major security issues include:
Injection Flaws
Injection flaws are the result from the classic failure for filtering untrusted input. It may happen when the unfiltered data is passed to the SQL server, the browser and LDAP server. The problem is that an attacker can easily inject the command for hijacking the browser and it can result in the loss of the data (Nunes et al. 2018). It is important that the information received from untrusted sources should be filtered. There are issues with configuration and use of blacklisting is not recommended. As blacklist can be used by hackers to bypass and it can cause failure of blacklist as the pattern does not match with the work.
Broken Authentication
The major web security issue can be caused by broken authentication and the problem occurs if the authentication does not step from the same root cause. The rolling of the authentication is not recommended and it can become hard for getting right. It can be the cause of possible pitfalls and it can be valued because the URL might contain the session ID and it can cause the lead in the referred header (Helmiawan et al. 2020). It may be because passwords cannot be encrypted in the storage and transit. It is easy to predict Session IDs and it can help in unauthorised access. Session hijacking is the cause of these security issues and it can occur because of timeouts that are not implemented correctly.
Cross-Site Scripting
In this web security issue the attacker can send the input of Javascript tags to the web application of the user. The user is then retired to the user unsanitized and the browser can execute the javascript tag. It can cause a widespread input sanitization failure that is the subcategory of infection flaws (Nunes et al. 2019). CSS is considered as simple as the crafting link and it is persuading the user to click and it can become more sinister. On loading the page, the script can run and it can be used for posting cookies to attackers.
Insecure Direct Object References
It can be the classic way for trusting user input and paying the price that can inherit the resultant security vulnerability. It includes addition of direct object reference that means it can affect internal objects like database keys and it can get exposed to users and it can leave it vulnerable to attacks (Agrawal et al. 2019). The attacker can provide the reference for tracking and the authorisation can be broken and the attacker can get into the system. Vulnerability includes a password reset function that relies on the input provided by the user for determining the identity.
Security Misconfiguration
The security mis-configuration in the web security issue, that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here