Looking for CMP5358 Software Security A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5358 Software Security A S1 2025/6 at moodle.bcu.ac.uk.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
A remote login service processes usernames and passwords sent by users. It stores the credentials in fixed-size memory buffers during the authentication process. The system does not enforce strict length checks on incoming login data. An attacker sends unusually long authentication input to the service. Explain how this vulnerability could allow the attacker to bypass authentication or gain elevated privileges.
Answer the following Questions:
A) How confident do you feel about meeting the submission deadline?
B) Do you need any additional support, clarification, or feedback to help you stay on track?
C) Are you aware of the support sessions (e.g., module drop-ins, tutorials, or office hours) available to help you with this coursework?
Do you know which resources (lecture notes, reading lists, example files, or external sources) you will use to complete your work? (Mention resources for the first two cases)
How much of the work have you completed so far? Describe briefly what you have done (You can answer as a percentage for first two cases or detail the work you have done so far).
Have you read and understood the assessment specification (at least first two cases) for the coursework?
Which of the following are effective defense mechanisms against SQL Injection attacks in healthcare data systems? (Select all that apply)
During testing on a webpage, you enter ' OR '1'='1 on a login form and gain unauthorized access. What does this indicate?
Which of the following best describes SQL Injection?
In the context of the MediCare Innovations case study, which of the following statements best reflects a comprehensive understanding of risks and mitigations in healthcare data and communication systems? (Select all that apply)
Which of the following are possible impacts of insecure communication in a Patient Record System? (Select all that apply)