Find Jobs
Hire Freelancers

Apply select NIST low-impact security controls to the JavaFX Login application

$10-30 USD

In Progress
Posted about 8 years ago

$10-30 USD

Paid on delivery
Apply select NIST low-impact security controls to the JavaFX Login application [login to view URL] The following security controls should be applied to the [login to view URL] application (check the NIST Security Controls Database for details, description and guidance for each control): • AC-7 - UNSUCCESSFUL LOGON ATTEMPTS • AC-8 - SYSTEM USE NOTIFICATION • AU-3 - CONTENT OF AUDIT RECORDS • AU-8 - TIME STAMPS • IA-2(1) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) | NETWORK ACCESS TO PRIVILEGED ACCOUNTS (Note this is an enhancement of an existing low-impact security control) • Select one additional low-impact security control and implement it. This can be an enhancement or a required low-impact security control. Selecting a control that provides documentation as opposed to code changes is also acceptable and encouraged. Hints: a. Start with the baseline Login Application and add methods (or additional classes) as needed to comply with each of the security controls. b. You will need to make some decisions for your implementation for the security audit/log files format. c. For the multi-factor authentication, keep it simple. One approach is to send an email to the user with a security code. Then, have them check their email and enter the code. If the code matches, they are properly authenticated. d. There are examples for using JavaMail and writing to files in the materials I have provided. Be sure to use those as needed. e. Pay attention to the details of the NIST database description and make sure all of the selected security controls for this project are fully implemented. Deliverables Provide your security fixed Java source code along with a PDF document describing how you addressed each security control. For example, you should list the security control and the descriptions and show and describe the code that addresses the security control. You should also provide screen shots and descriptions of the successful executing the code and the resultant output as applied to each security control. Be sure to submit all of your Java source code if you used multiple classes. Your code should be well documented with comments, include header comments, use proper variable and naming conventions and properly formatted. All references used should be included in your document.
Project ID: 10144863

About the project

2 proposals
Remote project
Active 8 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs

About the client

Flag of UNITED STATES
Germantown, United States
4.9
11
Payment method verified
Member since Mar 5, 2015

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.