Security Software Development Life Cycle
crownedYou are the Information Security manager of a regional bank based in New York. Your team has been funded to develop a customer-facing, cognitive system that interactively answers customer questions online. The conditions of funding include that the SDLC must incorporate security best practices in all phases of the life cycle.
Directions
Write a paper that includes the following:
- A description of the four SDLC stages of your end-to-end project
- A detailed explanation of the security measures you would incorporate into each stage of the SDLC in order to ensure security best practices are followed all along the life cycle of the project
- Include a description of under what circumstances you would employ HTTP protocol versus an SSL protocol.
Keep in mind, we are most interested in your ability to describe the SDLC stages and the steps you would take to enforce security during each stage. Use diagrams, where appropriate.
Deliverables:
- Your paper should be 2-3 pages in length, not including the title and reference pages.
- You must include a minimum of two (2) credible sources and information from the module to support your writing.
- Your paper must follow APA style guidelines, as appropriate.
- 8 years ago
- 20
Answer(2)
Purchase the answer to view it
Purchase the answer to view it
NOT RATED
- system_development_life_cycle_paper.doc
Bids(1)
other Questions(10)
- MKT 431 WEEK 2 Trends and Conditions Paper
- The_writer only
- In Email
- Simplfy (sin Θ − cos Θ)2 + (sin Θ + cos Θ)2
- SCIN 134 Lab 6 Exoplanets
- MATH 533 Final Exam
- function f(x) = 4(4)^x represents the growth of a fly population every year in a remote swamp. Jackie wants to manipulate the formula to an equivalent form that calculates three times a year, not just once a year. Which function is correct for Jackie's
- ACc - Saturn Co.
- BUS discussion
- BHA 3801: Critical Issues in Healthcare Part II Develop your own opinion about what constitutes social class. Give evidence to support your opinion.