Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

It is just a discussion. Please help... (L) Available on Feb 27, 2023 8:00 AM. Hidden before availability starts. Discussion assignment: Now that we have

It is just a discussion. Please help...

image text in transcribedimage text in transcribed

(L) Available on Feb 27, 2023 8:00 AM. Hidden before availability starts. Discussion assignment: Now that we have covered functions this week, and looked at input validation loops last week, let's talk about some potential security concerns. Specifically, problems can occur when input is not validated which can cause errors or cause the program to crash. For this discussion post, click on the following link which will take you to the Python Input Validation module as part of Towson University's Security Injection Project developed by Dr. Kaza and Dr. Taylor. http://cis1.towson.edu/ cyber4all/modulesanomodules/Input_ValidationCS1_Python.html Read through and watch the brief video in the "Background" and "Code Responsibly sections (sections 1 and 2). The page scrolls down in the content area. Once you answer the questions at the bottom you can advance to the next section, but only complete the first two parts. Now, after reading about some examples of real-life input validation errors that were quite substantial and looking at another example of a validation loop - create a new thread to discuss the following in a discussion board post: Part 1: Due March 6 Now, after reading about some examples of real-life input validation errors that were quite substantial and looking at another example of a validation loop - create a new thread to discuss the following in a discussion board post: Part 1: Due March 6 1. Discuss an example in your own code where user input caused your program to crash or malfunction. How did you fix it? (or should have fixed it?) 2. Create a small function that contains an input validation loop and explain how it works. (This can be a simple example, for instance checking if a phone number was entered and not a string, or checking the length of a value, etc. There are some ideas in part 2 in the list of checks) OR Find another real-life example of a program malfunction based on faulty user input or an example of a system being hacked through the use of non-validated input. Part 2: Due March 10th Comment and discuss the example provided by at least one other person. Have you had a similar experience? Do you agree with the validation loop? OR if they provided a real-life example of an error, what do you think? Could this have been prevented

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

6. What is process reengineering? Why is it relevant to training?

Answered: 1 week ago