Software security

You work as a developer for a software company Global Rain an engineering company that specializes in custom software design and development for entrepreneurs businesses and government agencies around the world. At your company part of your mission is that “Security is everyone’s responsibility.” You have been promoted to the newly formed agile scrum team for Global Rain. At Global Rain you are tasked with working with a client Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings retirement investments and insurance for their patrons. Artemis Financial desires to modernize its operations and as a crucial part of the success of its custom software they want to implement and apply the most current and effective software security. Artemis Financial has a RESTful web application programming interface (API) and is seeking Global Rain’s expertise in taking steps to protect the organization from external threats. As part of the team you are tasked with examining Artemis Financial’s web-based software application to identify any security vulnerabilities in their current software. Your assessment will be used to complete a vulnerability assessment report for mitigating the security vulnerabilities that you identify. You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template. *Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application. *Please note: You do not need to fix these vulnerabilities in this project. To complete this project you must submit the following: Vulnerability Assessment ReportDeliver a completed Vulnerability Assessment Report using the template provided. Follow the instructions in the template to ensure all items are met. The following resource(s) may help support your work on the project: Diagram: Vulnerability Assessment Process Flow DiagramReference this process flow diagram throughout the project to determine which of the seven areas of security to assess for Artemis Financial’s software application. A text version of this diagram is available: Vulnerability Assessment Process Flow Diagram Text Version. Java Software Application: CS 305 Project One Code Base.zipOpen a new Java project in Eclipse and upload this zipped file folder. This folder contains the code for the web application from Artemis Financial with security vulnerabilities for you to identify using the guidelines provided. Website: Secure Coding Guidelines for Java SEIn this project you will be examining Java code for security vulnerabilities. The “secure coding guidelines for Java SE” website provides an up-to-date list of common Java security concerns. The site also provides examples of Java code to examine and possible Java code solutions. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:What is the value of secure communications to the company?Are there any international transactions that the company produces?Are there governmental restrictions about secure communications to consider?What external threats might be present now and in the immediate future?What are the “modernization” requirements that must be considered such as the role of open source libraries and evolving web application technologies? What is the value of secure communications to the company? Are there any international transactions that the company produces? Are there governmental restrictions about secure communications to consider? What external threats might be present now and in the immediate future? What are the “modernization” requirements that must be considered such as the role of open source libraries and evolving web application technologies? Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file if applicable). Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically record the following from the dependency check report in your Vulnerability Assessment Report:The names or vulnerability codes of the known vulnerabilitiesA brief description and recommended solutions provided by the dependency check reportAttribution (if any) that documents how this vulnerability has been identified or documented previously The names or vulnerability codes of the known vulnerabilities A brief description and recommended solutions provided by the dependency check report Attribution (if any) that documents how this vulnerability has been identified or documented previously Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:What is the value of secure communications to the company?Are there any international transactions that the company produces?Are there governmental restrictions about secure communications to consider?What external threats might be present now and in the immediate future?What are the “modernization” requirements that must be considered such as the role of open source libraries and evolving web application technologies? Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file if applicable). Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically record the following from the dependency check report in your Vulnerability Assessment Report:The names or vulnerability codes of the known vulnerabilitiesA brief description and recommended solutions provided by the dependency check reportAttribution (if any) that documents how this vulnerability has been identified or documented previously The names or vulnerability codes of the known vulnerabilitiesA brief description and recommended solutions provided by the dependency check reportAttribution (if any) that documents how this vulnerability has been identified or documented previously Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY