SlideShare a Scribd company logo
Q23 You have been appolnted as a Head of Secure Software consultant for a new student
information system (SIS) development project for the Univeraiti Tun Hussein Onn Malaysla
(UTHM). SIS will be developed as both web-based and moblle-based system. SIS development
applied Development, Security, and Operations (Devsecops) model as project methodology. The
syatem's modules involve Student Record Maragement, Attendance, Exam Reaulta, Transcripts,
Medical Record, Class Schedules, Awards, and Student Dashboards. Based on the scenario,
answer the following questions: (a) Identify TWO (2) potential sccurity risks for cach of the
element in the STRIDE model for the mobile-based system. (12 marks) (b) Propose an input
validation flowchart to validate input from students registration. Assume the inputs are: Student
Name, Address (Street Name, Clly, state/Province, Postcode), Identity Card Number, Date of
Bitth, Matric Card Number, Contact Number, and Program Hame. ( 8 marks)

More Related Content

Similar to Q23 You have been appolnted as a Head of Secure Software consultant fo (1).docx

An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
CSCJournals
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
IJNSA Journal
 
vijay
vijayvijay
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
CSCJournals
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Marco Morana
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
CSCJournals
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
IJNSA Journal
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
IRJET Journal
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
CXT Group
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
IRJET Journal
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
Associate Professor in VSB Coimbatore
 
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
IJNSA Journal
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
IOSR Journals
 
Two-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptxTwo-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptx
PreethamS41
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 

Similar to Q23 You have been appolnted as a Head of Secure Software consultant fo (1).docx (20)

An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
vijay
vijayvijay
vijay
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
 
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Two-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptxTwo-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptx
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 

More from MattMl3Grays

Question 1A) Which of these statements could explain why inverted trop.docx
Question 1A) Which of these statements could explain why inverted trop.docxQuestion 1A) Which of these statements could explain why inverted trop.docx
Question 1A) Which of these statements could explain why inverted trop.docx
MattMl3Grays
 
Question 10 ( 2 points) Retake question Saved Select all characterist.docx
Question 10 ( 2 points) Retake question  Saved Select all characterist.docxQuestion 10 ( 2 points) Retake question  Saved Select all characterist.docx
Question 10 ( 2 points) Retake question Saved Select all characterist.docx
MattMl3Grays
 
Question 1.docx
Question 1.docxQuestion 1.docx
Question 1.docx
MattMl3Grays
 
Question 10 5-10pts Researchers are interested in estimating the preva.docx
Question 10 5-10pts Researchers are interested in estimating the preva.docxQuestion 10 5-10pts Researchers are interested in estimating the preva.docx
Question 10 5-10pts Researchers are interested in estimating the preva.docx
MattMl3Grays
 
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docxQuestion 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
MattMl3Grays
 
Question 1- A database is being constructed to keep track of the teams.docx
Question 1- A database is being constructed to keep track of the teams.docxQuestion 1- A database is being constructed to keep track of the teams.docx
Question 1- A database is being constructed to keep track of the teams.docx
MattMl3Grays
 
Question 02- Many years ago- Marissa paid $500 to put together a recor.docx
Question 02- Many years ago- Marissa paid $500 to put together a recor.docxQuestion 02- Many years ago- Marissa paid $500 to put together a recor.docx
Question 02- Many years ago- Marissa paid $500 to put together a recor.docx
MattMl3Grays
 
Que hiciste ayer -.docx
Que hiciste ayer -.docxQue hiciste ayer -.docx
Que hiciste ayer -.docx
MattMl3Grays
 
Q4- Which ONE of the following describes the CYCLIC electron transport.docx
Q4- Which ONE of the following describes the CYCLIC electron transport.docxQ4- Which ONE of the following describes the CYCLIC electron transport.docx
Q4- Which ONE of the following describes the CYCLIC electron transport.docx
MattMl3Grays
 
Q4- Consider X to be a normally distributed random variable with mean.docx
Q4- Consider X to be a normally distributed random variable with mean.docxQ4- Consider X to be a normally distributed random variable with mean.docx
Q4- Consider X to be a normally distributed random variable with mean.docx
MattMl3Grays
 
Q4-16- Your colleague designed a common garden experiment to determine.docx
Q4-16- Your colleague designed a common garden experiment to determine.docxQ4-16- Your colleague designed a common garden experiment to determine.docx
Q4-16- Your colleague designed a common garden experiment to determine.docx
MattMl3Grays
 
Q4 what is the time complexity of the following operations on a a) vec.docx
Q4 what is the time complexity of the following operations on a a) vec.docxQ4 what is the time complexity of the following operations on a a) vec.docx
Q4 what is the time complexity of the following operations on a a) vec.docx
MattMl3Grays
 
Q3- Show these results-for the second one- recall that to disprove a r.docx
Q3- Show these results-for the second one- recall that to disprove a r.docxQ3- Show these results-for the second one- recall that to disprove a r.docx
Q3- Show these results-for the second one- recall that to disprove a r.docx
MattMl3Grays
 
Q3- Progression through the cell division cycle is controlled in part.docx
Q3- Progression through the cell division cycle is controlled in part.docxQ3- Progression through the cell division cycle is controlled in part.docx
Q3- Progression through the cell division cycle is controlled in part.docx
MattMl3Grays
 
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docxQ10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
MattMl3Grays
 
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docxQ1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
MattMl3Grays
 
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docxQ1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
MattMl3Grays
 
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docxQ1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
MattMl3Grays
 
Re.docx
Re.docxRe.docx
Re.docx
MattMl3Grays
 
Rates in currency units per U-S- dollar except as noted by an asterisk.docx
Rates in currency units per U-S- dollar except as noted by an asterisk.docxRates in currency units per U-S- dollar except as noted by an asterisk.docx
Rates in currency units per U-S- dollar except as noted by an asterisk.docx
MattMl3Grays
 

More from MattMl3Grays (20)

Question 1A) Which of these statements could explain why inverted trop.docx
Question 1A) Which of these statements could explain why inverted trop.docxQuestion 1A) Which of these statements could explain why inverted trop.docx
Question 1A) Which of these statements could explain why inverted trop.docx
 
Question 10 ( 2 points) Retake question Saved Select all characterist.docx
Question 10 ( 2 points) Retake question  Saved Select all characterist.docxQuestion 10 ( 2 points) Retake question  Saved Select all characterist.docx
Question 10 ( 2 points) Retake question Saved Select all characterist.docx
 
Question 1.docx
Question 1.docxQuestion 1.docx
Question 1.docx
 
Question 10 5-10pts Researchers are interested in estimating the preva.docx
Question 10 5-10pts Researchers are interested in estimating the preva.docxQuestion 10 5-10pts Researchers are interested in estimating the preva.docx
Question 10 5-10pts Researchers are interested in estimating the preva.docx
 
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docxQuestion 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
Question 1-A) The carrier pigeon is an extinct speciesa) True b) False.docx
 
Question 1- A database is being constructed to keep track of the teams.docx
Question 1- A database is being constructed to keep track of the teams.docxQuestion 1- A database is being constructed to keep track of the teams.docx
Question 1- A database is being constructed to keep track of the teams.docx
 
Question 02- Many years ago- Marissa paid $500 to put together a recor.docx
Question 02- Many years ago- Marissa paid $500 to put together a recor.docxQuestion 02- Many years ago- Marissa paid $500 to put together a recor.docx
Question 02- Many years ago- Marissa paid $500 to put together a recor.docx
 
Que hiciste ayer -.docx
Que hiciste ayer -.docxQue hiciste ayer -.docx
Que hiciste ayer -.docx
 
Q4- Which ONE of the following describes the CYCLIC electron transport.docx
Q4- Which ONE of the following describes the CYCLIC electron transport.docxQ4- Which ONE of the following describes the CYCLIC electron transport.docx
Q4- Which ONE of the following describes the CYCLIC electron transport.docx
 
Q4- Consider X to be a normally distributed random variable with mean.docx
Q4- Consider X to be a normally distributed random variable with mean.docxQ4- Consider X to be a normally distributed random variable with mean.docx
Q4- Consider X to be a normally distributed random variable with mean.docx
 
Q4-16- Your colleague designed a common garden experiment to determine.docx
Q4-16- Your colleague designed a common garden experiment to determine.docxQ4-16- Your colleague designed a common garden experiment to determine.docx
Q4-16- Your colleague designed a common garden experiment to determine.docx
 
Q4 what is the time complexity of the following operations on a a) vec.docx
Q4 what is the time complexity of the following operations on a a) vec.docxQ4 what is the time complexity of the following operations on a a) vec.docx
Q4 what is the time complexity of the following operations on a a) vec.docx
 
Q3- Show these results-for the second one- recall that to disprove a r.docx
Q3- Show these results-for the second one- recall that to disprove a r.docxQ3- Show these results-for the second one- recall that to disprove a r.docx
Q3- Show these results-for the second one- recall that to disprove a r.docx
 
Q3- Progression through the cell division cycle is controlled in part.docx
Q3- Progression through the cell division cycle is controlled in part.docxQ3- Progression through the cell division cycle is controlled in part.docx
Q3- Progression through the cell division cycle is controlled in part.docx
 
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docxQ10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
Q10 Homework - Unanswered - Due Feb 21st- 10-00 AM What is the tax inc.docx
 
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docxQ1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
Q1-G8 Kasthik Rereuved 100-000 Lie los procedds as the named benefiein.docx
 
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docxQ1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
Q1-(21) Julu is applonching the loth Anniucyay ff hel 409000 lo yeak R.docx
 
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docxQ1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
Q1-7 Mirha is 65 yeals ald and has been Living in Canadt for the past.docx
 
Re.docx
Re.docxRe.docx
Re.docx
 
Rates in currency units per U-S- dollar except as noted by an asterisk.docx
Rates in currency units per U-S- dollar except as noted by an asterisk.docxRates in currency units per U-S- dollar except as noted by an asterisk.docx
Rates in currency units per U-S- dollar except as noted by an asterisk.docx
 

Recently uploaded

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 

Recently uploaded (20)

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 

Q23 You have been appolnted as a Head of Secure Software consultant fo (1).docx

  • 1. Q23 You have been appolnted as a Head of Secure Software consultant for a new student information system (SIS) development project for the Univeraiti Tun Hussein Onn Malaysla (UTHM). SIS will be developed as both web-based and moblle-based system. SIS development applied Development, Security, and Operations (Devsecops) model as project methodology. The syatem's modules involve Student Record Maragement, Attendance, Exam Reaulta, Transcripts, Medical Record, Class Schedules, Awards, and Student Dashboards. Based on the scenario, answer the following questions: (a) Identify TWO (2) potential sccurity risks for cach of the element in the STRIDE model for the mobile-based system. (12 marks) (b) Propose an input validation flowchart to validate input from students registration. Assume the inputs are: Student Name, Address (Street Name, Clly, state/Province, Postcode), Identity Card Number, Date of Bitth, Matric Card Number, Contact Number, and Program Hame. ( 8 marks)