Preview

IS3445 Project Part 5

Good Essays
Open Document
Open Document
343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3445 Project Part 5
Introduction What exactly is SDLC? SDLC stands for Software Development Life Cycle. SDLC is a series of phases that provide model for the development and lifecycle management of an application and/or software. Within SDLC, security should also be considered. How is the application going to be secured? Are we using these phases to the best of our knowledge and incorporating as much security as possible? There are six phases within SDLC. They are Systems analysis, design, implementation, testing, acceptance and deployment, and maintenance. There are four ways to secure SDLC. They are Governance, Construction, Verification, and Deployment. Within each way to secure SDLC, Governance there is strategy and metrics, policy and compliance, education and guidance, threat assessment, security requirements, security architecture, design review, code review, security testing, vulnerability management, hardening environments, and operations.
Resources to Create Secure Coding Policies and Guidelines SDLC has many models that will be beneficial in creating secure coding polices. These models are:
Waterfall
Iterative and Agile Scrum
Rapid Application Development
Rational Unified Process
Spiral Model and V-Model
There is also principle that should be followed when securing an application. They are minimize attack surface area, establish secure defaults, employ the principles of least privilege and defense in depth, fail securely, and not trusting services. There are also principles such as having a policy of separation of duties, avoiding security by obscurity, keeping security simply, and fixing security issues correctly.

Techniques for Software Developers to Review Code There are many techniques software developers should use while reviewing their code. These techniques will help ensure that the application is secured while also having an ease of use for the customers. Using these techniques will help bring the application to a secure point which will prevent unauthorized

You May Also Find These Documents Helpful

  • Better Essays

    Is3350 Final Exam

    • 1039 Words
    • 5 Pages

    Rationale: The client should focus on a distant object in order to promote pupil dilation. The ophthalmoscope should be set on the 0 lens to…

    • 1039 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions…

    • 775 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Is3350 Project 2

    • 949 Words
    • 4 Pages

    No, because at some point you have to take ownership, even in the face of danger.…

    • 949 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Web application design and coding defects are the main reasons to create a secure coding policy and guidelines. The policy/guidelines are to provide awareness and ensure security when developing code.…

    • 813 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    The Software Development Life Cycle (SDLC) gives very definable goals regardless of the methodology used; the development process will have a planning and a testing phase whether it is Waterfall or Agile. At Smith Consulting (SC), projects begin with a project planning phase when SC selects team leaders and assigns jobs to team members based on their particular strengths. Then SC locks project requirements into an open-ended Agile process…

    • 3816 Words
    • 16 Pages
    Best Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Final project it255

    • 1631 Words
    • 5 Pages

    System security has been very important ever since the beginning of the computer age. Security is setup for a number of reason whether it be to protect data from those who are not supposed to see it or hide it from those who are supposed to security at any point is important. Security can be physical, virtual or a mixture of the two, but in this day and age it is definitely needed. In the following I will give my opinion on how to increase or the steps I would use to implement security to a certain situation.…

    • 1631 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    2. List three important facts that the author uses to support the main idea: A. Verification and Validation involves static formal mathematical techniques such as proof of correctness and dynamic techniques such as testing to show consistency between the code and the basic initial specifications. B. Consumer protection consists of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. C. Software is an integral part of a computer system and the security of such a system depends on its hardware but even more so on the software component. There are more security attacks on systems through software “holes” than hardware, mainly through piracy, deletion and alteration of programs and data.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Web Application Security

    • 1495 Words
    • 6 Pages

    Even the most basic of all application security, whether it be web, desktop, server or cloud based, starts with good coding practices. The definition of “good” coding practices varies from programmer to programmer however, they all revolve around two primary concepts: efficiency and “looks”. The main goal here is to learn the…

    • 1495 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    c# basics

    • 26266 Words
    • 155 Pages

    Manually Using the Compiler Optimizations Securing Your Application Permissions Configuring Code Access Security Using Exception Handling with Imperative Security…

    • 26266 Words
    • 155 Pages
    Powerful Essays