Reference no: EM132353963
Cyber management and policy professionals need to be able to identify software security vulnerabilities and communicate those vulnerabilities to nontechnical policy makers. Whether an organization purchases commercially available software or develops original applications, understanding the vulnerabilities is especially important. Upon completion of this project, you will evaluate relevant vulnerabilities, determine potential costs associated with these vulnerabilities, and recommend the best solution for an organization. You will also develop and present a software maintenance plan, taking into consideration the Supply Chain Risk Management (SCRM) framework. Finally, you will present the recommended solution to a nontechnical audience. This is the third of four sequential projects. There are thirteen steps in this project. Begin by reviewing your project scenario, then proceed to Step 1.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1. Analyze secure software development methodologies and describe the cybersecurity issues that each methodology addresses.
2. Explain systems life cycle management concepts used to plan, develop, implement, operate, and maintain information systems.
3. Demonstrate secure principles, methods, and tools used in the software development life cycle.
4. Describe the cybersecurity implications related to procurement and supply chain risk management.
Attachment:- Project-software development methodologies.rar