Explain the specific security-relevant actions taken

Assignment Help Computer Engineering
Reference no: EM133657174

Assignment: Team

Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company's production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, "I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday."

Instructions

The project specs require a multi-page design. The app will need to provide an interface to your company's supply database for reading and entering data remotely as well as the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open-source software library modules.

A. Provide at least six steps in the SDLC during which security-strengthening behaviors will be applied.

B. Explain the specific security-relevant actions taken during each step, including the people involved, the considerations taken, and the security assurance methods used.

C. Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app's front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.

D. Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.

Reference no: EM133657174

Questions Cloud

Describe examples of cultural diversity : DHW 508 Evaluation of healthcare practice - Identify two people within your organisation or external organisations who have been assigned the roles
Determining eligibility for variety of health care services : The Federal Poverty Level plays an important role in determining eligibility for a variety of health care services, including public health services in many cas
Identify the purposes and characteristics of power supplies : What are the different kinds of storage devices available? How does one determine which to use? Identify the purposes and characteristics of power supplies.
Difference between medicaid and social security : What funding programs do you feel are the most important for older adults and why? what's the difference between Medicaid and social security.
Explain the specific security-relevant actions taken : Explain the specific security-relevant actions taken during each step, including the people involved, the considerations taken, and the security assurance metho
Coherent but covered in bright red vomit : Valerie Jones is a 78-year-old lady who was found on the floor by her daughter. She was coherent but covered in bright red vomit.
Dissemination of ebp and research : Dissemination of EBP and research, such as presenting results at a conference or writing an article for a journal, is an important part of professional practice
Critically reflect on their personal approach : TCHR3001 Early Childhood Matters - Identify a range of issues important to early childhood education and care and Critically reflect on their personal approach
What would treatment approach be for this impairment : Identify one specific impairment caused by right hemisphere damage. What would a treatment approach be for this impairment?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Authentication using public key cryptography

Explain the difference between authentication using public key cryptography, Message Authentication Codes, and digital signatures?

  Define how would training occur for your team

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Discuss the object-oriented approach in detail

Compare the object-oriented approach to design to the traditional approach. Give your opinion on whether or not you believe there are certain projects.

  Suppose that screen is an ostream iterator initialized

What is the output of the following program segment? (suppose that screen is an ostream iterator initialized to the standard output device to output elements of the type int.)

  Have you broken any HIPAA rules

If you have a signed authorization from the patient but fax the medical record to a different business by mistake, have you broken any HIPAA rules? Why or why

  Summarize your network security controls

Summarize your network security controls in a Word document and submit it to your instructor. You must provide rationale for your choices by explaining.

  Write a script that asks the user for two numbers a and b

Write a script that asks the user for two numbers a and b, and then prints all the prime numbers existing between a and b in ascending order.

  Describe three different resources for teachers

Describe three different resources for teachers and how they are used to research educational technology to facilitate student learning .

  What are some mitigation techniques you would recommend

DOS and DDOS attacks are common for any number of reasons. Research an attack within the past 5 years and find a related connection to social media

  Reengineer the program in order to fit the new objectives

Reconstruct four (4) steps taken by Mayor Schell to reengineer the program in order to fit the new objectives

  Identify and describe 7 types of literature review

Identify and describe 7 types of literature review Write the difference and similarities of each type of literature review Put your answer in a table or matrix

  How would you assess quality of a computer program

we have developed quality factors that we look for in a software product to measure quality. These are usually done at the macroscopic level, but how would you assess quality of a computer program if you received an e-mail with a source listing of..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd