Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 13, Problem 13.9E
Explanation of Solution
Validating a password protection system:
Verification and validation processes for a password protection system must focus on security assessment.
Validating a password protection systems are:
- First one needs to identify possible threats. Some of the threats for password protection system are:
- Attacker gains access without a password.
- Attacker guesses a password of an authorized user.
- Users make passwords available to attackers.
- Attacker uses a password cracking tool to discover passwords of authorized users...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What security concerns must be addressed in parking software?
Consider all concerns that may arise, from the coding to the application's deployment and use.
Note: Consider how it will be used in the context of the entire program.
Why do bugs exist, exactly? How may a bug come into a piece of software? Provide some specific examples.
Application security should be defined.
Knowledge Booster
Similar questions
- How can you protect yourself against a downgrade attack?arrow_forwardExplain the practical use of a challenge-response authentication system.How does it make a system that needs a password to access it any less secure?arrow_forwardA user interface can be extremely constraining in its capabilities. The interface design, for example, may prevent users from leaving the application and returning to the Windows desktop or from logging on to the Internet. Such limitations in a user interface should be avoided. How do you feel about it, and why do you feel that way?arrow_forward
- Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.arrow_forwardWhat is the purpose of the rkhunter application? Explain the different options available for what it can scan and how this would be useful to IT personnel.arrow_forwardIt's crucial that you comprehend downgrade attacks and how to defend against them.arrow_forward
- Explain what it means to have an authentication challenge–response system in place. A method that relies on passwords is not as secure as the one shown here.arrow_forwardThere are a multitude of methods to get your hands on some application software. Please include concrete examples to back up your claim.arrow_forwardThere are several options available for obtaining certain pieces of application software. If you could provide us some examples to prove your point, that would be great.arrow_forward
- You are using a new release of an application software package. You think that you have dis-covered a bug. Outline the approach that you would take to confirm that it is indeed a bug. What actions would you take if it truly were a bug?arrow_forwardThe most difficult bugs to tackle aren't often the most obvious.arrow_forwardBank Management System (Must contain JavaFX, thread and socket. During project presentation, it will be checked how much features you have completed.) time : 8 hoursarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L