ICTPRG537 Implement security for applications

ICTPRG537 Implement security for applications

student assessment tasks
Implement security for applications

This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as expressed in the RTO Works License Agreement.

The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.

While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of any errors and any suggestions for improvement.

IT Works is a series of training and assessment resources developed for qualifications within the Information and Communications Technology Training Package.

CONTENTS

Introduction  4

Assessment Task 1: Knowledge Questions  5

Assessment Task 1: Checklist 7

Assessment Task 2: Project Portfolio  8

Assessment Task 2: Checklist 12

Final Results Record  14

Introduction

The assessment tasks for ICTPRG537 Implement security for applications are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course.

Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide. The Student User Guide provides important information for you relating to completing assessment successfully.

Assessment for this unit

ICTPRG537 Implement security for applications describes the skills and knowledge required to implement security for software applications, including code access security, security access control, cryptographic and secure, input and output handling.

For you to be assessed as competent, you must successfully complete two assessment tasks:

  • Assessment Task 1: Knowledge questions – You must answer all questions correctly.
  • Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio.

Assessment Task 1: Knowledge Questions

Information for students

Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:

  • review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment taskwhether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Questions

Provide answers to all of the questions below:

  1. Explain the purpose of hardware as part of security measures and list two types of hardware relevant to implementing security for applications.
  2. Explain the purpose of network security and list two types of network security methods.
  3. Identify the three categories of cryptographic algorithms that are the most secure.
  4. Explain how Object-oriented programming can be used to implement applications security.
  5. Describe two mathematics topics that it would be important for a programmer to understand in relation to algorithms.

Assessment Task 1: Checklist

Student’s name:
Did the student provide a sufficient and clear answer that addresses the suggested answer for the following?Completed successfully?Comments
YesNo 
Question 1   
Question 2   
Question 3   
Question 4   
Question 5   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 


Assessment Task 2: Project Portfolio

Information for students

In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.

You will need access to:

  • a suitable place to complete activities that replicates an ICT development environment including computer and internet access and relevant hardware and software
  • security configuration tools
  • testing and debugging tools
  • your learning resources and other information for reference
  • Project Portfolio template.

Ensure that you:

  • review the advice to students regarding responding to written tasks in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information
Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedhow your assessment should be submitted. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix B of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Activities

Complete the following activities:

  1. Carefully read the following:
This project requires you to implement security for two software applications. This will mean building a software application and implementing security as part of the build. The software application you choose to build and implement security for can be any two software applications of your choice. For example: An app to keep notesA To Do appA chat appA survey appA form that can be used to collect data from users through a web site. Whichever application you choose, it must be capable of storing and retrieving information. You can also use any programming language of your choice. Vocational education and training is all about gaining and developing practical skills that are industry relevant and that can help you to succeed in your chosen career. For this reason, basing your project on real applications will mean that you are applying your knowledge and skills in a relevant, practical and meaningful way! Speak to your assessor to get approval for the applications you want to develop and implement security for. You will be collecting evidence for this unit in a Project Portfolio. The steps you need to take are outlined below.
  • Preparation
Complete Page 4 of your Project Portfolio for this unit. Read through the requirements of Section 1 and 2 of your Project Portfolio which include detailed guidance relevant to all the assessment activities.
  • Planning security implementation
You are now to complete Section 1 of your Project Portfolio. This involves: Describing the applications you have chosen to develop.Documenting the programming language you will use, as well as the reason for your choice of programming language. Explaining why application security is required in software development.Planning and describing the approach you will take to security (your security strategy) for each application. This should be integrated into your software development process and should also include:your authentication and authorisation strategydefining access permissionstandard cryptographic algorithms that you will usehow you will protect the application against injections. 
Complete Section 1 of your Project Portfolio. Submit your Portfolio to your assessor.
  • Develop applications and implement security
Following this you are to develop and implement security for the two applications. Remember that during the development of the applications you are to configure the files according to the platform you are using so that the files are secure. For each software application you are to: Develop the application following the software development process and incorporating security controls.Implementing restricted access to protect the applicationsEncrypt and decrypt data used in your application using the standard cryptographic algorithms you determined as part of your planning.Develop the code using secure input and output handling. Once you have completed all of the above, run the applications you have developed for the purposes of testing and debugging.
Complete Section 2 of your Project Portfolio. Submit your Portfolio.
  • Present applications
The final part of this activity requires you to present the two applications you have developed to your student group. The purpose of the presentation is to assess your oral communication skills.  The group you present to will be a small group of students or the whole group. Your assessor will advise you of this plus the date and time of the presentation. At the presentation you are to briefly describe the applications you developed and how you implemented security. Your presentation will be for approximately 5 minutes. Your assessor will be looking to see that you can: demonstrate effective communication skills including:speaking clearly and concisely using non-verbal communication to assist with understanding asking questions to identify required information responding to questions as required using active listening techniques to confirm understandinguse suitable industry standard technical language in describing your work.
iThis can either be viewed in person by your assessor or you may like to video record the session for your assessor to watch later. Your assessor can provide you with more details at this step. Make sure you follow the instructions above and meet the timeframes allocated.
  • Submit your completed Project Portfolio 
Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary. Submit to your assessor for marking.

Assessment Task 2: Checklist

Student’s name:
Did the student:Completed successfully?Comments
YesNo 
Implement security for two different applications?   
Identifying the purpose of application security as part of software development?    
Planning a security strategy including: the authentication and authorisation strategydefining access permissionidentifying standard cryptographic algorithms identifying how the applications will be protected against injections?   
Determine and document required standard cryptographic algorithms?   
Encrypt, and decrypt, data using standard cryptographic algorithms?   
Using secure input and output handling for each application?   
Preventing security attacks by implementing security on each application?   
Document all processes and outcomes relevant to security implementation?   
Use effective communication skills to present applications developed?   
Use industry standard technical language to describe applications developed?   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 

Final Results Record

Student name: 
Assessor name: 
Date 

Final assessment results

TaskTypeResult
SatisfactoryUnsatisfactoryDid not submit
Assessment Task 1Knowledge questionsSUDNS
Assessment Task 2Project PortfolioSUDNS
Overall unit results CNYC 

Feedback

Student signature: __________________________________________   Date: ____________

Assessor signature:   _______________________________________   Date:  ____________

Order Now

Get expert help for ICTPRG537 Implement security for applications and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (April 18, 2024) ICTPRG537 Implement security for applications. Retrieved from https://universalassignment.com/ictprg537-implement-security-for-applications/.
"ICTPRG537 Implement security for applications." Universal Assignment - April 18, 2024, https://universalassignment.com/ictprg537-implement-security-for-applications/
Universal Assignment July 23, 2022 ICTPRG537 Implement security for applications., viewed April 18, 2024,<https://universalassignment.com/ictprg537-implement-security-for-applications/>
Universal Assignment - ICTPRG537 Implement security for applications. [Internet]. [Accessed April 18, 2024]. Available from: https://universalassignment.com/ictprg537-implement-security-for-applications/
"ICTPRG537 Implement security for applications." Universal Assignment - Accessed April 18, 2024. https://universalassignment.com/ictprg537-implement-security-for-applications/
"ICTPRG537 Implement security for applications." Universal Assignment [Online]. Available: https://universalassignment.com/ictprg537-implement-security-for-applications/. [Accessed: April 18, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment: Implement five dangerous software errors

Due: Monday, 6 May 2024, 3:00 PM The requirements for assessment 1: Too many developers are prioritising functionality and performance over security. Either that, or they just don’t come from a security background, so they don’t have security in mind when they are developing the application, therefore leaving the business

Read More »

LNDN08003 DATA ANALYTICS FINAL PROJECT

Business School                                                                 London campus Session 2023-24                                                                   Trimester 2 Module Code: LNDN08003 DATA ANALYTICS FINAL PROJECT Due Date: 12th APRIL 2024 Answer ALL questions. LNDN08003–Data Analytics Group Empirical Research Project Question 2-The project (2500 maximum word limit) The datasets for this assignment should be downloaded from the World Development Indicators (WDI)

Read More »

Microprocessor Based Systems: Embedded Burglar Alarm System

ASSIGNMENT BRIEF 2023/24 Microprocessor Based Systems   Embedded Burglar Alarm System Learning Outcomes This assignment achieves the following learning outcomes:   LO 2 -Use software for developing embedded systems in ‘C’ and testing microcontroller systems including the use of design tools such as Integrated Development Environments and In Circuit Debugger.

Read More »

Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security

Part 1, scenario: Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security. The presentation will be given to entry-level IT and security employees to understand financial investing. To simulate

Read More »

DX5600 Digital Artefact and Research Report

COLLEGE OF ENGINEERING, DESIGN AND PHYSICAL SCIENCES BRUNEL DESIGN SCHOOL DIGITAL MEDIA MSC DIGITAL DESIGN AND BRANDING MSC DIGITAL DESIGN (3D ANIMTION) MSC DIGITAL DESIGN (MOTION GRAPHICS) MSC DIGITAL DESIGN (IMMERSIVE MIXED REALITY) DIGITAL ARTEFACT AND RESEARCH REPORT                                                                 Module Code: DX5600 Module Title: MSc Dissertation Module Leader: XXXXXXXXXXXXXXXXX Assessment Title:

Read More »

Bsc Public Health and Health Promotion (Top up) LSC LONDON

Health and Work Assignment Brief.                 Assessment brief: A case study of 4,000 words (weighted at 100%) Students will present a series of complementary pieces of written work that:   a) analyse the key workplace issues; b) evaluate current or proposed strategies for managing them from a public health/health promotion perspective

Read More »

6HW109 Environmental Management and Sustainable Health

ASSESSMENT BRIEF MODULE CODE: 6HW109 MODULE TITLE: Environmental Management and Sustainable Health MODULE LEADER: XXXXXXXXX ACADEMIC YEAR: 2022-23 1        Demonstrate a critical awareness of the concept of Environmental Management linked to Health 2        Critically analyse climate change and health public policies. 3        Demonstrate a critical awareness of the concept of

Read More »

PROFESSIONAL SECURE NETWORKS COCS71196

PROFESSIONAL SECURE NETWORKS– Case Study Assessment Information Module Title: PROFESSIONAL SECURE NETWORKS   Module Code: COCS71196 Submission Deadline: 10th May 2024 by 3:30pm Instructions to candidates This assignment is one of two parts of the formal assessment for COCS71196 and is therefore compulsory. The assignment is weighted at 50% of

Read More »

CYBERCRIME FORENSIC ANALYSIS – COCS71193

CYBERCRIME FORENSIC ANALYSIS – COCS71193 Assignment Specification Weighted at 100% of the module mark. Learning Outcomes being assessed by this portfolio. Submission Deadline: Monday 6th May 2024, 1600Hrs. Requirements & Marking Scheme General Guidelines: This is an individual assessment comprised of four parts and is weighted at 100% of the

Read More »

Social Media Campaigns (SMC) Spring 2024 – Winter 2024

Unit: Dynamic Websites Assignment title: Social Media Campaigns (SMC) Spring 2024 – Winter 2024 Students must not use templates that they have not designed or created in this module assessment. This includes website building applications, free HTML5 website templates, or any software that is available to them to help with

Read More »

ABCJ3103 NEWS WRITING AND REPORTING Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCJ3103 NEWS WRITING AND REPORTING PENULISAN DAN PELAPORAN BERITA JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam bahasa Melayu atau bahasa Inggeris. Jumlah patah perkataan: 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam PELBAGAIfail. Tugasan ini dihantar secara ONLINE. Tarikh

Read More »

ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY TEKNOLOGI MAKLUMAT, MEDIA DAN MASYARAKAT JANUARY 2021 SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar

Read More »

ABCR3203 COMMUNICATION LAW Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCR3203 COMMUNICATION LAW UNDANG-UNDANG KOMUNIKASI JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar secara ONLINE. Tarikh penghantaran        :

Read More »

ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT

POSTGRADUATE DIPLOMA IN BUSINESS MANAGEMENT ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT NOTE: At postgraduate level, you are expected to substantiate your answers with evidence from independent research. INTRODUCTION TO THE ASSIGNMENT • This assignment consists of FOUR compulsory questions. Please answer all of them. • When you answer, preferably use

Read More »

Solution: Scenario 1, Mirror therapy in patients post stroke

Title: Scenario 1, Mirror therapy in patients post stroke Part 1 : Summary Ramachandran and colleagues developed mirror therapy to treat amputees’ agony from phantom limbs. Patients were able to feel their amputated limb without experiencing any pain by presenting them a mirror image of their healthy arm. Since then,

Read More »

Solution: Exploring the Dominance of Silence

Slide 1: Title – Exploring the Dominance of Silence The title, “Exploring the Dominance of Silence,” sets the stage for a deep dive into the portrayal of silence in Philip K. Dick’s “Do Androids Dream of Electric Sheep?” Our presentation will dissect the literary techniques used by the author to

Read More »

Solution: Assessment: Critical Reflection S2 2023

The policies that hampered the cultural survival of Indigenous groups have a major effect on their health (Coffin, 2007). Cultural isolation can cause an identity crisis and a sense of loss, which can exacerbate mental health problems. Indigenous people have greater rates of chronic illness and impairment due to historical

Read More »

Solution: The Market – Product and Competition Analysis

Section 1: The Market – Product and Competition Analysis Industry and Competition Analysis: The baking mix market is very competitive, but My Better Batch is entering it anyhow. The prepackaged baking mixes sold in this market allow busy people to have bakery-quality products on the table quickly without sacrificing quality

Read More »

Solution: PDCA model for Riot

Student Name: Student ID: University Name: Date: Learning Outcome 1: Engage actively in recognizing a new product/service for Riot and detect the vital tasks required for its effective growth. In this comprehensive learning outcome, Riot’s progress towards innovation superiority is characterized by a deliberate scheme that draws on components from

Read More »

Solution: EDEN 100 – ASSIGNMENT 1

Part 1: Reflections on the Register Variables Use the questions in Column 1 and analyse the sample oral interactions provided under the assessment tile. The transcript for Viv’s conversation is provided on pages 4-5. Probe Questions  Link to readings and theory Interaction 1 Interaction 2 PART 1 – ANALYSING THE

Read More »

Solution: TCP/IP Questions

Table of Contents Question 1. 1 1. IPSec datagram protocol 1 2. Source and destination IP addresses in original IP datagram.. 1 3. Source and destination IP addresses in new IP header 2 4. Protocol number in the protocol field of the new IP header 2 5. Information and Bob.

Read More »

Solution: Fundamentals of Employment Assistance Program and Counselling

ASSESSMENT 3 Subject: Fundamentals of Employment Assistance Program and Counselling Case study Question 1 a)     Major Issues for Theo that could be addressed in counselling: b)    Issues to Address First in Short-Term Counselling:             The cognitive processes of memory, focus, and decision-making are all impacted by insufficient sleep. Such cognitive

Read More »

Solution: EQUITY AND INCLUSION IN EARLY CHILDHOOD IN AUSTRALIA

Written Policy Recommendation Name: Student Number: Email: Date: Introduction: The early years of a child’s life are important for their holistic development, making early childhood education a foundation for their future accomplishments. Nevertheless, guaranteeing equality and inclusion in early childhood education stays a major problem in our society. This policy

Read More »

Solution: Report Health Issue

Table of Contents Executive Summary                                                                                                   3 Introduction                                                                                                                5 Examination of the Chosen Health Issue in the Context of Lambeth                        5 Application of Health Inequality Framework and Analysis of Determinants: Psychotropic Drug Use in Lambeth                                                                           6 Exploration and Discussion of Strategies to Manage Psychotropic Drug Use in Lambeth                                                                                                                        7 Conclusion                                                                                                                  8

Read More »

Solution: Section III: Marketing

Section III: Marketing Channels for Advertising: Understanding Who Makes Baking Product Purchase Decisions is Crucial for My Better Batch’s Business Success (Sampson et al, 2017). Home bakers may make up a disproportionate share of the decision-makers in the UK. As a result, My Better Batch has to target people, especially

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?