Develop a 20 slide Power Point presentation explaining the role of Security Controls in Software Security
Develop a 20 slide Power Point presentation explaining the role of Security Controls in Software Security using concepts discussed in the course. Focus your presentation on the steps in the SDL (security development lifecycle), including A1 – A5 and PRSA 1-5 (phases of the security lifecycle).
A white-hat hacking/vulnerability company contacts you claiming that they have discovered a zero-day attack vulnerability in your new health care software for clinics and hospitals.
A white-hat hacking/vulnerability company contacts you claiming that they have discovered a zero-day attack vulnerability in your new health care software for clinics and hospitals. The vulnerability is not known to the public nor to the black-hat hacking community. And, the white-hat company is offering to sell you a fix. Based upon the course, what […]
Currently, your company still uses an early generation fuzzer for security testing
Currently, your company still uses an early generation fuzzer for security testing. An associate recommends purchasing a next-generation fuzzer that incorporates AI and has the ability to fix defects. How will you investigate these new fuzzers and build a case to management for a purchase? Based upon the course, what would be the advantages to […]
You are assisting in the development of a new accounts payable program for internal use within your company
You are assisting in the development of a new accounts payable program for internal use within your company. The major business stakeholder, the V.P. of Finance, wants to skip some of the security testing for the program to reduce costs. Her argument is that the program will be used internally, and rigorous testing is unnecessary. […]
Your marketing manager comes to you and indicates that customers are complaining about the latest release of your database software
Your marketing manager comes to you and indicates that customers are complaining about the latest release of your database software. Customers claim that their clients can see each other’s data even though the software supposedly imposes a “Chinese Wall” to keep different clients’ data separate. Based upon the course, what are your Post-Release responses?