Describe the importance of secure software

Assignment Help Computer Engineering
Reference no: EM133499650

Case: It is essential as a security expert to be able to evaluate potential risks within a security infrastructure in order to position security controls/countermeasures. The system design document (SDD) describes the high-level system design and the low-level detailed design specifications from which a system is built. As part of the security development team, this document provides the information necessary for designing and implementing a system.

Ndzovu & Sons Corporation is a retail business dealing with groceries with five departments ( Deli, Pharmacy, Produce, Dairy, and grocery) in each of its stores spread across Northern America with its headquarters in Winchester, Virginia.
, Design document and the overall security architecture structure diagram for your current organization

Part 1: Security Architecture
Address the following:
Question 1. Identify and define all hardware and software devices, and the different types of sensitive data the organization will store.
Question 2. Explain the organization's technical requirements in compliance with all devices and services internally and externally that could be a potential target for cyberattacks.
Question 3. Describe in-depth how the security controls and services are positioned, and how they relate to the overall systems architecture to prevent attacks.
Question 4. Demonstrate restricting access, layering security, employing authentication, encrypting storage, and automating data security by including the full scope of policy, procedural, and technical responsibilities in the IT infrastructure.
Question 5. Apply knowledge to effectively manage a security program.
Question 6. Assess the effectiveness of a security program.

Part 2: System Design
Address the following:
Question 1. Describe the design goals and considerations, and articulate threat modeling, providing a high-level overview of the security architecture.
Question 2. Describe the security baselining and the data design associated with the system, and explain the human-machine interface and operational scenarios.
Question 3. Design a high-level system diagram that further deconstructs into low-level detailed design specifications for each system component, including hardware, internal communications, software, system integrity controls, and external interfaces, all of which are a part of the program monitoring and control.
Question 4. Describe the importance of secure software, and the programming practices, development processes, and methodologies that lead to secure software.

Reference no: EM133499650

Questions Cloud

How photographers editor tailor images to their liking : The Influence of Digital Culture. Also talk about how photography/editing now is very easily accessible and the reasons for editing today.
Discuss what you have enjoyed learning : Discuss what you have enjoyed learning about and the activities that you found helpful. Is there anything that you didn't find useful or interesting
How is the symbol utilized by buddhists today : REL 2300- How is the symbol utilized by Buddhists today? Discuss who Siddhartha Gautama was and the impact that he had on Buddhism.
Describe the predominate model theory of leadership used : Describe the predominate model/theory of leadership used by this leader. Describe their style of leadership.
Describe the importance of secure software : Describe the importance of secure software, and the programming practices, development processes, and methodologies that lead to secure software
Develop a report that provides information on the importance : Develop a report that provides information on the importance of this type of process as well as a blueprint for setting up the process as soon as possible
Why do you think the issues presented : Based on your reading in chapter 60, why do you think the issues presented in this chapter persist in today's workforce culture?
Provide a recommendation to bcc leadership : provide a recommendation to BCC leadership on the prioritization of spending for these two initiatives
What is least privilege : What Is Least Privilege and Give an example of how a company would implement Least Privilege in their Finance department

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why is intellectual property entitled to legal protection

Why is intellectual property entitled to legal protection? Why did copyright laws become stricter and more punishing in the late 20th century?

  Ask the user to specify an input file and output file

Write a program in JAVA (project) that asks the user to specify an input file and output file.

  Do you know the major differences between the discrete and

question 1 do you know the main differences between a discrete as well as a continuous distribution? question 1 what

  Prepare an implementation of the citypathconnector interface

Prepare an implementation of the CityPathConnector interface. Use the ListCitySelector. This allows you to hard code a city order so you can test specific test.

  Exchange knights in the minimum number of turns

On a 3 x 4 chessboard there are 3 black knights (B B B) and three white knights (W W W). Exchange knights in the minimum number of turns.

  What is the maximum number of words that can be stored

The Intel 8086 processor addresses a maximum of 220 bytes of memory. What is the maximum number of 16-bit words that can be stored in this memory?

  Prompt the user to input a character by printing the string

At the start of the program, prompt the user to input a character by printing the string "Would you like to exit? (y/n)\n".

  Summarize your network security controls

Summarize your network security controls in a Word document and submit it to your instructor. You must provide rationale for your choices by explaining.

  Applying pmbok concepts to process change

Describe how Six Sigma would be used to evaluate, measure, and encourage continuous improvement concerning the scenario topic you chose

  Write hello to the screen

Write Hello to the screen - with displaying an output while not breaking out of the running procedure

  Calculates the present day value of an amount received

Present Value (PV) is a formula used in finance that calculates the present day value of an amount received at a future date.

  Create a function that can normalize the input data by

Write a function that can find the numbers which are divisible by 7 but are not a multiple of 5.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd