Which method of secure software development life cycle

Assignment Help Basic Computer Science
Reference no: EM132361287

Best Coding Practices

You have been promoted to manager for the e-Commerce site for the company you made up in Assignment 1. You are concerned about the recent SQL attack. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the Website and database to be compromised by a SQL injection attack.

Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all of the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.

For Part I, you're going to write a memo to the CEO and CSO documenting your guidelines based on your findings when you evaluated your company's processes.

Justify why it is less expensive to build secure software than to correct security issues after a breach.

Outline the objectives and purpose of your company's "best secure coding practices" and explain how it will influence your division.

Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts into your existing processes.

Identify three resources that can be used as "reference material" and act as a beginner's guideline for new employees. Outline the importance of each resource and how each resource can assist new coders.

Use at least four quality references in this assignment. Note: Wikipedia and similar websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Test the links to ensure they work before submitting your paper

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow professional business language format.

Part II: PowerPoint Presentation

Create a PowerPoint presentation for your team in which you:

Outline the all of the major aspects of the Best Practice Coding guideline, including objectives, purpose, resources, and methodology. Note: Please include your fictional company's name on each slide of your presentation. Remember, you're planning on using this experience when you take what you've learned out into the real world.

Reference no: EM132361287

Questions Cloud

Intellectual property protections different across the world : How are intellectual property protections different across the world? compare the patent and copyright protections offered in those countries to those in the US
Court cases that deal with theft of intellectual property : Briefly summarize two important US court cases that deal with the theft of intellectual property. when the theft of intellectual property is legally justified?
US Supreme court case of Parker v. Flook : Analysis of the 1978 US Supreme court case of Parker v. Flook, 437 U.S. 584 where the court came very close to banning software patents.
The art and science of digital forensics. : The Art and Science of Digital Forensics. Research some tools that would be valuable in collecting both live memory images and images of various forms off media
Which method of secure software development life cycle : Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts
Systems analysis and design : ISYS 225-Assignments 1 is related to proposing information system to solve business problems in a real-world organization.
Information systems for decision-making-presentation : CIS 500-Goals: What the project hopes to accomplish. what people/skills are required and what development life cycle do you recommend?
Explain how social media has been used in terrorism : Explain how social media has been used in terrorism. Determine which agency should be involved in an investigation involving "hate" sites.
Drive organizational strategy-information systems strategy : Why is it important for business strategy to drive organizational strategy-information systems strategy? What might happen if business strategy was not driver?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd