{"id":78507,"date":"2021-12-01T13:49:47","date_gmt":"2021-12-01T13:49:47","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/12\/01\/cs-305-module-two-code-review-and-mitigation-plan-assignment-instructions-replace\/"},"modified":"2021-12-01T13:49:47","modified_gmt":"2021-12-01T13:49:47","slug":"cs-305-module-two-code-review-and-mitigation-plan-assignment-instructions-replace","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/12\/01\/cs-305-module-two-code-review-and-mitigation-plan-assignment-instructions-replace\/","title":{"rendered":"CS 305 Module Two Code Review and Mitigation Plan Assignment Instructions Replace"},"content":{"rendered":"<p>CS 305 Module Two Code Review and Mitigation Plan Assignment<\/p>\n<p> Instructions<\/p>\n<p> Replace the bracketed text with your own words. If you choose to include images or supporting materials, be sure to insert them throughout.<\/p>\n<p> Areas of Security<\/p>\n<p> [Review the scenario and use what you know about the architecture of the web application to determine which of the seven areas of security are relevant to assess using the Vulnerability Assessment Process Flow diagram (VAPFD). Document your findings for the software development team.]<\/p>\n<p> [Be sure to justify your reasoning for why each area is relevant to the software application.]<\/p>\n<p> Code Review Summary<\/p>\n<p> [Once you have identified the relevant areas of security to review from the first level of the VAPFD, work through the second level. At this stage, you should manually inspect the code base provided to identify which vulnerabilities exist. Document your findings for the software development team.]<\/p>\n<p> Mitigation Plan<\/p>\n<p> [Once you have manually inspected the code and identified the security vulnerabilities, describe potential mitigation techniques such as secure software designs that you could apply to address the software security vulnerabilities you identified. Document your findings for the software development team.]<\/p>\n<p> 1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CS 305 Module Two Code Review and Mitigation Plan Assignment Instructions Replace the bracketed text with your own words. If you choose to include images or supporting materials, be sure to insert them throughout. Areas of Security [Review the scenario and use what you know about the architecture of the web application to determine which [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-78507","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=78507"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78507\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=78507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=78507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=78507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}