| Category | Assignment | Subject | Education |
|---|---|---|---|
| University | University of Limerick (UOL) | Module Title | Software Compliance |
| Word Count | 2,500 – 3,000 words |
|---|---|
| Assessment Type | Continuous Assignment 1 |
| Assessment Title | Bug Report |
Module: Software Compliance
Assignment Title: Bug Report
Weighting: 40%
Word Count: 2,500 – 3,000 words
Submission Format: Word document via Blackboard
Referencing: Harvard style (Harvard UL)
Writing Style: Narrative form only (no bullet points)
The purpose of the case study project is to get you acquainted with the security challenges in the real word. In class, you will learn about security ideals, common mistakes, and best practices. In the case study, you will see how those ideals are applied (or not applied!) to actual problems.
This case study is designed to help you in the investigation of security issues. The project will help you to learn about software projects from the outside in. This means reading bug reports, documentation, tracking issues and code changes and anything else you can get your hands on, to understand what’s going on.
Remember: This is a research project as much as it is a writing project. Plan on taking a lot of time researching and understanding vulnerabilities and security risks.
You must choose a case study yourself. Choosing a vulnerability/bug from a project may take some effort, as not every vulnerability/bug out there will make a good candidate for your report. Here are some requirements to make ensure you choose a good case study:
A few notes:
Please use following formatting throughout your paper.
Stealing someone else’s writing will not be tolerated. Do not copy text from other sources. For example, do not simply copy the project website’s description into your description. The use of AI generated text will not be marked.
You must reference your work.
Places to start
| Content | Marks |
| Introduction & Context | 5 |
| Bug/App overview – Description of the Bug/App that is being investigated. | 10 |
| Security Risks – identification and discussion of the security risks of the bug and the vulnerability it exposed. Use the CIA Triad | 15 |
| Bug Details – Details the vulnerability/bug that is being investigated and how it works | 15 |
| Fix, Mitigation & Response – How was the bug fixed, or the vulnerability made safe. The code that caused the bug, how it was fixed, what attack it could have/did cause. How it could have been prevented. | 15 |
| Bug/Vulnerability History – Identifying the location and method of tracking the bug/issues, where was it recorded, describe how it evolved from a bug to a fix. | 15 |
| Conclusion – Conclusion on the fix, how secure is it? What were the dangers/vulnerabilities with it? How well has it been fix and highlighted to customers. What have you learned by researching this vulnerability? What have learned from this research. | 15 |
| Structure & Academic Writing | 5 |
| Referencing & Evidence | 5 |
| TOTAL | 100 |
Are you facing a Software Compliance Continuous Assignment 1: Bug Report?
Hire Assignment Helper Now!Need help with your Software Compliance Continuous Assignment 1 – Bug Analysis Report? Get expert guidance and improve your grades with our Ireland Assignment Help. We provide clear explanations, step-by-step solutions, and a Free List of Assignment Samples to help you understand better. Our academic experts ensure your work is accurate, original, and well-structured. Make your learning journey easier and achieve academic success with our trusted support.
Hire Assignment Helper Today!
Let's Book Your Work with Our Expert and Get High-Quality Content