Question Details Normal
$ 32.00
Application 5 | Charting Dependencies and Drawing Conclusions
Question posted by

Software defects almost never exist in a vacuum. That is, the problem with ensuring application security is that there are usually additional defects or issues that have to be identified, understood, and resolved along with the actual defect in the code to which they are attached. These additional defects are considered dependencies.


In this assignment, you will examine dependencies associated with mitigating CSRF holes in websites and develop data-supported conclusions about the complexity of ensuring against CSRF holes.


Go to Bugzilla and enter the term "CSRF." Scroll to the bottom of the results page. There will be a way to display dependencies based on a graph and a tree.


Then, using the graph, the tree, and any explicit empirical measure that you feel is appropriate to characterize that defect, prepare a 2- to 3-page paper that presents the following:


•An estimate of how difficult this problem will be to resolve. Base that estimate on a quantitative measure that will support your assessment of the defect and the dependencies involved.

•An assessment of the relative complexity of the process needed to solve CSRF problems using quantitative measures and what you know about those dependencies.

•Your conclusions about how to resolve the problem based on the same quantitative measures.

Available solutions
$ 32.00
Charting Dependencies and Drawing Conclusions | Application 5 | Scored 100%
  • This Solution has been Purchased 1 time
  • Submitted On 16 Jan, 2015 07:52:41
Solution posted by
Since there are no standards defined right now, so we cannot restrict this behaviour unless it can be made impossible for attackers to specify valid application URLs. It will require information related to the user session to be contained in valid URLs. This is not known to the attacker and theref...
Buy now to view full solution.
Only 45 characters allowed.

$ 629.35