System Development or Application Assurance Transcript
Your vulnerability assessment has been completed, and it’s a good thing, because you found several system weaknesses in the area of application software security.
If these weaknesses were exploited, it could ruin your company’s reputation — not to mention causing major disruptions to operations and unexpected costs.
You plan on following up on these issues this afternoon, but it’s about lunchtime, so you head out for a quick bite to eat.
You pass by Maria Sosa’s office and see her at her desk. You knock on her door frame, peek inside, and ask if she has a minute.
Maria motions to you: “Come on in. What brings you to my office?”
You give her a high-level overview of your findings, and tell her that after lunch, you plan to start taking an even closer look.
Maria says, “That sounds great. Can you write up your analysis and recommendations for solutions? I’d like to share this with important stakeholders at the executive meeting next week. How does that sound?”
You nod in agreement.
Then you make a beeline back to your office and grab an energy bar from your desk. You need to prepare for your presentation for the meeting next week.
Project 4 Start Here
It is critical that cybersecurity professionals be able to use all applicable systems, tools, and concepts to minimize risks to an organization’s cyberspace and prevent cybersecurity incidents. In this project, you will demonstrate your understanding of how to apply security principles, methods, and tools within the software development life cycle. You will also apply your knowledge of the cybersecurity implications related to procurement and supply chain risk management.
This is the fourth and final project for this course. There are 13 steps in this project. Begin below to review your project scenario.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
1.5: Use sentence structure appropriate to the task, message and audience.
2.4: Consider and analyze information in context to the issue or problem.
9.4: Demonstrate secure principles, methods, and tools used in the software development life cycle.
9.5: Describe the cybersecurity implications related to procurement and supply chain risk management.
Step 1: Assess Software Vulnerabilities
Project 1 outlined the steps involved to produce a final vulnerability assessment and Project 2 covered risk analysis & mitigation. Those assessment were across the entire enterprise and included numerous elements outside the realm of systems and technology. However, they did uncover opportunities for improvement in the application software processes.
For this step, return to the vulnerability assessment from Project 1 and focus on all areas of application software that were itemized. Give additional thought to uncover software that perhaps did not make the list or were assumed to be secure and simply overlooked.
The assignment is to create a more comprehensive list of application software that could place the enterprise at risk of a breach, loss of data, loss of production, and/or loss of brand confidence.
The assessment should include the application of secure principles, development models such as the maturity model or integrated product and process development (IPPD), software development methods, libraries & toolsets used in the software development life cycle or systems development life cycle.
Use the Software Vulnerability Assessment Template to submit your results for feedback. In the next step, you will review your organization’s software procurement policy.
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we\'ll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.