subject

Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional knowledge applied using Python functionality. Submission requirements for this project include 2 files. (Zipping them into one file is acceptable and encouraged): Python Web Application Code (Python code for all routes, templates, static files and other files) Word or PDF file containing your test, pylint results and Cryptographic results. . Python Applications for this lab: (total 100 points): 1. (50 points) In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create: a. Password update Form - This Python form allows a previously registered user to reset their password after they have successfully logged in. b. Authentication functions - These Python functions will check the following NIST SP 800-63B criteria are met upon password update: Use the previous criteria for password length and complexity. (This work should already be done.) Compare the prospective secrets against a list that contains values known to be commonly- used, expected, or compromised (Provided as CommonPasswords. txt). If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret. C. Logger - Create a log to log all failed login attempts. The Log should include date, time and IP address. . Hints:
1. Start early. This will take you longer than you think.
2. Leverage the File 1/0, Flask and Data structures work previously performed in the class.
3. Use functions to enhance code reuse and modularity.
4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons.
5. Use comments to document your code
6. Test with many combinations.
7. Use pylint to verify the code style – the goal is a 10! 2. (30 points)
Using the Decrypting Secret Messages sites found in this week's readings, decrypt the following messages.
a. b. U28gdGhpcyBpcyBiYxNlNjQuIE5vdyBJIGt ub3cu
C. Psuwb Ysm W oa gc qzsjsf. Bc cbs qcizr dcggwpzm twuifs hvwg cih. Sbr Ysm ---
Provide the decoded message along with the Cipher and any other parameters you used to solve each puzzle. Hints:
1. Use the rumkin site
2. You will need to experiment some to narrow down the possible algorithms used. Some are more obvious than others.
3. You will know when you have selected the correct Cipher

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 16:00
Page orientation can be either landscape or
Answers: 1
question
Computers and Technology, 22.06.2019 21:30
Nathan wants to create multiple worksheet containing common formatting styles for his team members. which file extension him to save these worksheets? nathan to create multiple worksheets with common styles. he needs to save them with the extension.
Answers: 1
question
Computers and Technology, 22.06.2019 23:50
You need to design a circuit that implements the functions in the following table: s0 s1 function0 0 a + 10 1 a – b1 0 a + b1 1 a – 1s0 and s1 are 1-bit control inputs to select the function of the circuit. inputs a and b are 4-bitnumbers in 2s complement form. the output is also a 4-bit number in 2s complement form.you are allowed to use only one ttl 7483 4-bit adder to implement all the functions. but anynumber of other components (except the adder) can be used.hint: design a combinational logic circuit to modify the input b and the “carry input” of theadder depending on the control inputs s0 and s1.important: lab grade will depend on the working of the circuit & will be checked of by your labinstructor.1. is the output valid for the following input combinations: a. s0 = 0, s1 = 0, a = 7, b = 3? b. s0 = 0, s1 = 1, a = 7, b = 3? c. s0 = 1, s1 = 0, a = -4, b = -5? d. s0 = 1, s1 = 1, a = -8, b = 6? 2. what is the range of inputs (for both a and b) that will produce the valid output for all the functions?
Answers: 3
question
Computers and Technology, 24.06.2019 22:00
Iam trying to get my google account back for school and business, can someone ?
Answers: 1
You know the right answer?
Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and...
Questions
question
Physics, 03.08.2019 15:10
Questions on the website: 13722367