Studying Large Repositories of Source Code - Assignment
12 Pages2264 Words82 Views
Added on 2021-06-14
Studying Large Repositories of Source Code - Assignment
Added on 2021-06-14
BookmarkShareRelated Documents
Running head: PROJECT PLAN AND PRELIMINARY DESIGN MARKING GUIDE1PROJECT PLAN AND PRELIMINARY DESIGN MARKING GUIDE [Author][Institution]
PROJECT PLAN AND PRELIMINARY DESIGN MARKING GUIDE2Table of ContentsTitle: Studying large repositories of source code and identifying vulnerable code............3Introduction..........................................................................................................................3Gantt chart...........................................................................................................................3Project Diagram...................................................................................................................7Project Methodology...........................................................................................................8Static analysis..................................................................................................................8Dynamic analysis.............................................................................................................9Budget................................................................................................................................10References..........................................................................................................................12List of TablesTable 1 Activity Table.....................................................................................................................4Index of FiguresFigure 1: Gantt timeline chart..........................................................................................................6Figure 2: Network Diagram.............................................................................................................7Figure 3: Project Diagram...............................................................................................................7
PROJECT PLAN AND PRELIMINARY DESIGN MARKING GUIDE3Title: Studying large repositories of source code and identifying vulnerable codeIntroductionLarge repositories are the storage system in computers or it is a database of informationregarding application software which involves data elements, inputs, processes, outputs andinterrelationships. This project is aimed towards the study of large repositories of source code aswell recognizing the vulnerable codes. In this, study has been made to find out the vulnerablecode [1]. Generally, vulnerability in terms of IT is a flaw or error in code which can createpotential point of security compromise for the endpoint or network. Moreover, vulnerabilitiesgenerate attack vectors by which an intruder could easily run a code and can access the memoryof target system. For finding vulnerabilities, researcher has used testing techniques and learnt regarding thetesting techniques process to find the vulnerabilities [2]. Thus, this report describes the projectwhich has been run for finding out the vulnerable code by learning large repositories of sourcecode. Moreover, this report also describes the schedule for working on the project andmethodologies used to find out the bugs or vulnerable codes in the software application. Inmethodology section, static analysis as well as dynamic analysis has been used by the researcher.Gantt chartGantt chart is basically a graphical description of a project schedule. It is a type of a barchart which presents the start and end of several activities of a project. Gantt chart is prepared foridentifying all the activities of the project [3]. It is a kind of monitoring tool which helps inmonitoring the activity of a project in a stated manner. Furthermore, it helps the researcher tokeep a track over activities so that one of the elements left undone. In this section, activity table,
PROJECT PLAN AND PRELIMINARY DESIGN MARKING GUIDE4Gantt chart and network diagram has been mentioned. This will help to accomplish the rest ofthe project in an efficient manner.Table 1 Activity TableName of theTaskPeriodBeginson Ends onPredecessorsNames of the ResourceVulnerablecode project64 daysFri5/4/18Wed8/1/18Choosingsuitableapproach toidentifyvulnerable code5 daysFriday5-4-18Thursday5-10-18Project manager, SoftwareengineerDefiningcharacteristicsof vulnerablecode10 daysFriday5-11-18Thursday5-24-182Information TechnologymanagerApplication ofstatic analysis12 daysFriday5-25-18Monday 6-11-183Software engineerApplication ofdynamicanalysis15 daysTuesday6-12-18Monday 7-2-183,4Software engineerConformingtherequirements ofthe project10 daysTuesday6-12-18Monday 6-25-184Project managerRunning theprogramme to10 daysTuesday6-26-18Monday 7-9-186Automated vulnerabilityscanners[1],IT manager
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Week Planning for Project Managementlg...
|5
|626
|493
Project Management: Work Breakdown Structure, Network Diagram, Gantt Chart, Budget, Risk, Communication, Status Report, Reflectionlg...