COM6012 Secure Development and Deployment Assignment

Assignment Help Software Engineering
Reference no: EM132660232

COM6012 Secure Development and Deployment

Learning Outcome 1: Demonstrate an understanding of the fundamental design and implementation principles that preserve security properties;
Learning Outcome 2: Critically appraise security requirements and their role in securing software systems and the data they store and manage;
Learning Outcome 3: Predict software security design and implementation flaws; Identify web application security controls and risk mitigation techniques.
Learning Outcome 4: Produce software products that meet ethical standards when creating, deploying; using, and retiring of software;
Learning Outcome 5: Apply static and dynamic testing to large software systems. Assess web application security compliance requirements and objectives.

The Learning and Teaching Strategy is informed by BAC's Strategy for Learning. The contents of this module are introduced in lectures. These are supported by practical exercises in laboratory sessions. Tutorials are used to help explain and elaborate on both the lecture material and the laboratory exercises.
All lecture, laboratory, and tutorial material will be made available on BAC Learn and links will be provided to appropriate external material such as research papers, podcasts, MOOCs, videos, and literature.
During all lab and tutorial sessions, students will receive formative feedback on their performance in undertaking the laboratory and tutorial exercises.
Summative feedback and marks will be provided for the coursework assignments undertaken as part of the module using BAC Learn.

BAC Learn will also be used to provide the students with module-specific forums to stimulate student and lecturer interaction out with the normal lecture, laboratory, and tutorial sessions.

The cyber threat landscape has changed dramatically. Probably because the traditional practice of late-stage testing has proven to be expensive and complex. So, to identify issues earlier and reduce costs, security must be integrated into every step of the software development lifecycle (SDLC). Here's what a typical security plan for a secure SDLC might look like:

1. Requirements stage
• Establishing the software security team, security champions, and other team structures.
• Training and education for the development team.
• Ensuring security standards and guidelines are widely available.
• Establishing processes to support the delivery of the requirements.

2. Design stage
• Identifying security requirements for the business context
• Threat modeling to understand how an attacker would look at the system
• Reviewing designs from a security perspective.

3. Implementation and development stage
• Reviewing code for implementation mistakes
• Security testing the various elements of the system, both independently and as a system
• Automated testing as part of the continuous integration (CI) development model

4. Deployment stage
• Building incident playbooks

5. Maintenance
• Ongoing testing
• Monitoring

In The assignment:
1. A project aim and objective will be setup that must have the business context
2. Selection Testing and credentialing secure app development across the SDLC and justify
3. Use Security Beyond Secure Coding - Challenging the traditional mindset where secure coding means a secure application.
4. The most comprehensive training program for application developers covering techniques such as input validation, defensive coding practices, authentication and authorization, cryptographic attacks, error handling techniques, session management techniques, among many others.
5. Conclusion and recommendation

6. Must use IEEE format

Attachment:- Secure Development and Deployment.rar

Reference no: EM132660232

Questions Cloud

Compute wilma tax liability and the tax savings : Wilma qualifies for head-of-household filing status. Compute Wilma's tax liability and the tax savings from the alternative tax on net capital gain
What is Phil and Susan AGI : Phil and Susan Hammond are married taxpayers filing a joint return. The couple have two dependent children. What is Phil and Susan AGI
Research victims rights in several different states : Research victims' rights in several different states. Compare and contrast the victims rights in the different states.Critique the different rights.
Describe the challenges prosecutors have : Describe the challenges prosecutors have in dealing with computer crime. Describe the profiles of employees and insiders who commit computer crimes.
COM6012 Secure Development and Deployment Assignment : COM6012 Secure Development and Deployment Assignment Help and Solution - Demonstrate an understanding of the fundamental design and implementation principles
What are the amount and nature of the gain : Eugene is a collector of antique glassware and occasionally sells a piece to get funds to buy another. What are the amount and nature of the gain
Discuss the importance of international cooperation : The student will discuss the importance of international cooperation between countries when fighting the threat of terrorism. Give a relative example!
What would you recommend as possible solutions : Describe the two most significant challenges facing Law Enforcement in combating computer crime. What would you recommend as possible solutions?
What is Elaine net capital gain or loss : What is Elaine's net capital gain or loss? Draft a letter to Elaine describing how the net capital gain or loss will be treated on her tax return

Reviews

len2660232

10/10/2020 6:48:38 AM

Assignment should come along with an application (could based or web based) More documents will be added for your convenient. This documentation will be more or less 4000 worlds only. Kindly read the document each and every word and assign a qualified Tutor. This time I''ll ask correction within 4000 words only, not more than that. If my professor needs correction that will be within 4000 words only, no additional work, but you have to ensure that your tutor must agree on corrections.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd