A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file

Review the threat model for this.

The system is run by an administrator to monitor traffic, looking for evidence of malware. The aspects needing protection include the following:

The integrity of the monitoring system. An attacker should not be able to generate traffic that will cause the monitoring software to change anything on the system on which it runs. Keep in mind that at least part of this software has to run as a privileged user to have full access to network traffic.

The availability of the monitoring system. An attacker should not be able to generate traffic that will cause the monitoring software to crash. For our purposes, this includes (but is not limited to) having exception handling be complete and correct.

Confidentiality of the collected data. All network traffic that should be kept private should be encrypted. This rarely occurs in practice, however. Therefore, collected traffic should not be available to anybody other than the authorized user(s). This confidentiality covers both network packet header information (such as source and destination) as well as packet data.

The secure failure mode for the system is to shut down. Whenever possible, the system should recover from problems. If an unrecoverable event occurs the system should properly log the event and then cleanly cease operations.

In a Report file, create a security code review checklist for the Java program Below.

Include items from the CWE/SANS Top 25 and OWASP Top 10 checklists, and as many of the standard checklist items as you find applicable for this. Assume that the operating system and all libraries are OK. Find and list all places in the program code where data enters the program. Be sure to consider and look for hidden inputs, exception handling (even those thrown by library functions), and overflow errors.

Channel.java

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 1

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 2

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 3

DetecHttpPolling.java

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 4

DNSQuery

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 5

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 6

Package botnets

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 7

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 8

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 9

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 10

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 11

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 12

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 13

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 14

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 15

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 16

Commands.java

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 17

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 18

Detection.java

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 19

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 20

Host.java

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 21

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 22

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 23

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 24

A word document for a Java code "security code review checklist" and conduct a security code review of the Java program and document your findings in detail in a word document report file 25

conduct your own security code review of the Java program you explored in the Part above and document your findings in detail in a report file (word document)