Identify resources that can be used as reference material

Assignment Help Other Subject
Reference no: EM132248255

Question: You have been promoted to manager for the e-Commerce site for the company you made up in Assignment 1. You are concerned about the recent SQL attack. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the Website and database to be compromised by a SQL injection attack.

Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all of the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.

For Part I, you're going to write a memo to the CEO and CSO documenting your guidelines based on your findings when you evaluated your company's processes.

1. Justify why it is less expensive to build secure software than to correct security issues after a breach.

2. Outline the objectives and purpose of your company's "best secure coding practices" and explain how it will influence your division.

3. Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts into your existing processes.

4. Identify three resources that can be used as "reference material" and act as a beginner's guideline for new employees. Outline the importance of each resource and how each resource can assist new coders.

5. Use at least four quality references in this assignment. Note: Wikipedia and similar websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Test the links to ensure they work before submitting your paper

6. Format your assignment according to the following formatting requirements:

• Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

• Include a reference page. Citations and references must follow professional business language format.

Part II: PowerPoint Presentation

Create a PowerPoint presentation for your team in which you:

1. Outline the all of the major aspects of the Best Practice Coding guideline, including objectives, purpose, resources, and methodology.

Note: Please include your fictional company's name on each slide of your presentation. Remember, you're planning on using this experience when you take what you've learned out into the real world.

The specific course learning outcomes associated with this assignment are:

1. Analyze common Website attacks, weaknesses, and security best practices.

2. Describe the attributes and qualities of secure coding practices and the tools used to conduct security verification.

3. Analyze the role and importance of quality assurance testing for Web applications using a security lifecycle.

4. Use technology and information resources to research issues in securing Web-based applications.

5. Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Reference no: EM132248255

Questions Cloud

Describe the term motivations and ideologies : In a 750- to 1000-word paper, explain the difference between the white hat, black hat, and grey hat computer hacker. Expound upon the role and impact.
Associated with the summer olympics : What are some examples of "marketing" activities that are associated with the Summer Olympics?
How can businesses use technology and relationships : How can businesses use technology and relationships to reduce their environmental impact?
Work center corresponding to automatic car wash machines : What is the cycle time (or throughput) time of the work center corresponding to the automatic car wash machines?
Identify resources that can be used as reference material : Identify three resources that can be used as "reference material" and act as a beginner's guideline for new employees. Outline the importance of each resource.
Presenting a speech on the contribution to holes : Which model is Joe's best choice if he is presenting a speech on the contribution to holes in the ozone by cattle?
Source evaluation so important in academic writing : Why is source evaluation so important in academic writing and research?
Methods used by the human resource department : What would be examples of valid selection methods used by the human resource department to ensure selecting the appropriate candidate for a job.
Environmental analysis important for an organization : Why is environmental analysis important for an organization? Please be detailed.

Reviews

Write a Review

Other Subject Questions & Answers

  Erik ericksons stage of development ego integrity

What are the key ideas of Erik Ericksons Stage of development Ego Integrity vs. Despair

  Recruitment and selection

A hospital in your community is looking for a CLO to head the HR department to create a learning organization as the hospital moves to be a teaching facility. Analyze the methods utilized for both external and internal recruitment and determine which..

  Benefits of arbitration and mediation for union and nonunion

Benefits of Arbitration and Mediation for union and nonunion, Arbitration of statutory rights in union and nonunion cases

  Copyright procedure to register and employment at will

What is a copyright? What is the procedure to register a copyright? How is a copyright different from a patent?

  Provide possible ways to identify and avoid the fallacy

For your follow up posting, choose a classmates instance of fallacious reasoning and provide possible ways to identify and avoid the fallacy

  What actions have been taken affecting terrorist financing

What actions have been taken affecting terrorist financing? Are they effective? Are there other measures that could be taken? 300 words

  Evolution of social psychology

Select three key points in the evolution of social psychology that are paramount to the field. Include one element of Lewins' influence on situationism.

  What are the pros/cons of a high protein diet for athletes

What are the protein requirements for Liz and Larry based upon the information provided and their athletic status?What are the pros/cons of a high protein diet for athletes?What advice would you give to Liz and Larry on whether they should follow a ..

  At a distance of 15 m the potential is 40 v and the

a long the axis of a uniformly charged disk at a point 0.6 m from the center of the disk the potential is 80 v and the

  Provide a summary analysis of the trend

Select a current or emerging trend in the delivery of health care or in professional practice from the allied health perspective in one of the following areas:(1) health care reform,(2) provider shortages,(3) practice trends,(4) leadership challeng..

  Risk management in dental practice

What do you think is the most critical aspect of Risk Management in dental practice? How do you think this will affect your dental hygiene practice?

  Discuss about the community policing & gang prevention

The findings from criminal justice research help us to understand how theories and concepts can be applied to real-world phenomena. One way to make such applications is to review research that explores one or more key concepts discussed in this un..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd