Preview

Is3445 Unit 5 Project Part 5 Analysis

Better Essays
Open Document
Open Document
813 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3445 Unit 5 Project Part 5 Analysis
NAME
IS3445 – Security Strategies in Web Applications and Social Networking
Unit 5 Project Part 5: Analyze the Software Development Life Cycle (SDLC)
January 29, 2015
Report
Resources to create secure coding and guidelines:
Web application design and coding defects are the main reasons to create a secure coding policy and guidelines. The policy/guidelines are to provide awareness and ensure security when developing code.
Techniques to secure code review:
Generally, IT analyst can divide the secure code review process into two different techniques:
1. Automated tool based/ Black Box: In this approach, the secure code review is done using different open source/commercial tools. Mostly developers use them while they are coding, but a security
…show more content…
Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only …show more content…
This includes defining stakeholders, conducting stakeholder interviews and possibly some basic prototyping. It is also important to identify security requirements (Harwood, 2011).
Development & Acquisition Phase - Transition functional and technical requirements into detailed plans for an actual information system. Results from interviews, use cases, and mock ups are developed into sequence diagrams, activity diagrams, state diagrams, and other artifacts that can be interpreted by software developers. User interfaces are also defined in greater detail (Harwood, 2011).
Implementation & Assessment Phase - Actual coding of an information system. All of the analysis and design artifacts previously created are transformed into application code by developers/programmers. This phase also includes testing and debugging (Harwood, 2011).
Operations & Maintenance Phase - Encompasses all activities required to keep the system working as intended (monitoring, patch management, application fault remediation and audits).
Disposition Phase - Ensures that information is retained, as necessary, to conform to current legal requirements and to accommodate future technology changes that may render the retrieval method obsolete (Harwood, 2011).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The life cycle starts with preliminary investigation which all the available information needed for the system elements and allocation of the requirements to the software are gathered. Next is the analysis of the requirements. This involves the analyst understanding the functions of the software which is required for the system based off the gathered information. Then is the system design in which the analyst designs and finalizes the best suited design for the system. The difficult step of system coding or development comes next which is where the analyst translates the design and programs into code for the computer. After the previous steps next are the testing phase where the system is testing to see if it works as intended or not. Then is implementation where the system is given to the customer and feedback is returned to insure the program works as intended. And finally system maintenance is the last step, here the analyst insures the system remains working within the proper bounds and functions appropriately and fixes any problems.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Good Essays

    “Businesses and organizations use various types of information systems to support the many processes needed to carry out their business functions. Each of these information systems has a particular purpose or focus, and each has a life of its own. This “life of its own” concept is called the systems development life cycle or SDLC, and it includes the entire process of planning, building, deploying, using, updating, and maintaining an information system. The development of a new information system involves several different, but related activities. These activities, or phases, usually include planning, analysis, design, implementation, and maintenance/support. In other words, SDLC is a conceptual model that guides project management in information system development.”(Wikibooks)…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3

    • 680 Words
    • 3 Pages

    Although many organizations have reduce significant number of design and coding defects through software development lifecycle; there still remains security holes that arise when an application is deployed and interacts with other processes and different operating systems (Cobb, 2014). Another reason that penetration test is critical is many Payment Card Industry Data Security Standard (PCI DSS) mandate internal and external penetration test (Cobb,2014).…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    M3 QUIZ 2

    • 238 Words
    • 1 Page

    -When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing BLACK BOX TESTS OF PROGRAM CONTROLS…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    code galore caselet

    • 761 Words
    • 4 Pages

    1. What are some of the emerging IT security technologies that should be considered in solving the Problem related to the case?…

    • 761 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Work Breakdown Structure

    • 579 Words
    • 3 Pages

    Design phase is where all the requirements analyzed are modeled to be seen closer to the reality.…

    • 579 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quality Center Tool

    • 1350 Words
    • 6 Pages

    HP Application Lifecycle Management (ALM) 11.00 HP Quality Center 11.00 Roman Zednik HP Software Austria WARUM 11? QC Product Release Overview Product Name Version Previous Version Previous Name Release HP Test Data Management HP ALM 1.0 11.0 N/A 10.0 (derived from HP DB Archiving 6.2) HP QC Premier HP Q3 17-092010…

    • 1350 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Thesis Manual Revised 2014

    • 13232 Words
    • 59 Pages

    course), the translation stage where the architectural brief is transformed into a workable and viable…

    • 13232 Words
    • 59 Pages
    Better Essays