CTCH 685 9040: Unit 7 Assignment: Encryption with GPG for Software Security

CTCH 685 9040: Unit 7 Assignment: Encryption with GPG for Software Security

Unit 7 Assignment: Encryption with GPG for Software Security

Exercise 1: Evaluate the foundational concepts and tenets of secure software development.

  1. Complete the Encryption with GPG for Software Security hands-on exercises.
  2. What are the primary principles of secure software development that should be applied when designing the MedPeople web application?
  3. How does the implementation of GPG encryption enhance the security of sensitive patient data in the MedPeople web application?
  4. Explain how key management and regular updates to encryption practices can mitigate risks in the MedPeople web application.

Exercise 2: Enumerate the essential features that characterize secure programming.

  1. Identify and explain three essential features of secure programming that should be integrated into the MedPeople web application.
  2. How does symmetric encryption contribute to the security of personal use applications within the MedPeople corporation?
  3. Discuss the significance of using passphrase-based encryption for communication between different medical devices in the MedPeople system.

Exercise 3: Delineate the specific types of vulnerabilities prevalent in different programming languages.

  1. What types of vulnerabilities are most common in web applications developed with languages used in the MedPeople application, and how can they be mitigated?
  2. How can static and dynamic code analysis tools help identify and prevent vulnerabilities in the MedPeople web application?
  3. Describe the role of OpenSSL in enhancing the security of applications written in various programming languages.

Exercise 4: Contrast the common vulnerabilities associated with the use of libraries and outline initial steps for their mitigation.

  1. What are the common security vulnerabilities associated with third-party libraries, and how can they impact the MedPeople web application?
  2. Explain the initial steps you would take to assess and mitigate vulnerabilities introduced by third-party libraries in the MedPeople application.
  3. How can configuring GPG to use strong cryptographic algorithms help in mitigating risks associated with third-party libraries?

Tutorial for Encryption with GPG for Software Security

Encryption with GPG for Software Security

$30.00

Posted

in

by