Limited Offer Get 25% off — use code BESTW25
No AI No Plagiarism On-Time Delivery Free Revisions
Claim Now

Enterprise System Development As part of their outreach activities, Bee Global Inc is organizing the Bee Design Awards 2021, to encourage young designers to submit their creative designs and share them with the rest of the world. The company has commissioned a third-party vendor to create a website for the above-mentioned competition. Currently, the website supports the following feature

Enterprise System Development
As part of their outreach activities, Bee Global Inc is organizing the Bee Design Awards 2021, to encourage young designers to submit their creative designs and share them with the rest of the world.
The company has commissioned a third-party vendor to create a website for the above-mentioned competition.

Currently, the website supports the following features:

Participants can register and submit their design entries for this competition
Bee Design staff can log in to the system and perform administrative tasks such as viewing all the users and their entries.
The competition committee wants to make the existing system more secure. They have identified you as a suitable person to take on the task of reviewing the system for vulnerabilities and applying the necessary remedies to eliminate any vulnerabilities found.

The full source code of the Bee Design Awards is provided to you to complete this assignment.
Specifically, you are expected to embark on these tasks:

Perform penetration tests to check if there are any vulnerabilities that can be exploited by potential hackers.
Perform a code review on the application’s code to uncover any loopholes that may render the application insecure.
Modify the existing codes of the application to rectify the vulnerabilities that you have uncovered.
Document the above activities in a report which should include:
a) a description of each vulnerability discovered in the given application.
b) a step-by-step guide to show how each vulnerability can be exploited.
c) a step-by-step guide to show how each vulnerability can be remedied.
d) evidence to show that you have addressed the flaw.

Plagiarism Free Assignment Help

Expert Help With This Assignment — On Your Terms

Native UK, USA & Australia writers Deadline from 3 hours 100% Plagiarism-Free — Turnitin included Unlimited free revisions Free to submit — compare quotes