Question

In: Computer Science

As we talked about the Software Development Lifecycle. We approached it from the standpoint of where...

As we talked about the Software Development Lifecycle. We approached it from the standpoint of where security needs to be added to the SDLC. When code is insecure, it introduces vulnerabilities that get exploited. As security practitioners, this is where we come into the equation. However, that being said - we should be advocates for security in the development phase because it will make everyone's life easier once the software is deployed. We have to make a conscious effort to implement security that doesn't get in the way of business productivity. Every day, millions of corporate workers download files and email attachments, not knowing whether they could contain malware (such as viruses or Trojan horses). This happens even with appropriate use policies and warnings from administrators. How would you enforce such rules, without limiting the usability of workers’ systems?

Solutions

Expert Solution

Security plays an important role in everyone's life. Every single person would like to have a privacy and security of their personal information/data and always wanted their data, system, mobile phone and all the latest technological devices which are open to internet to be safe secure and invulnerable. But, as we are exposed to the internet, there is always a chance of getting exposed to such malacious activities where hackers or anonymous users tries to access data or to get the control of your system by different approaches i.e. by sending mails containing the links, once a user clicks on to that link, virus spreads in the system and if we accidently download an application sent by malacious users, then they can easily access to our data as well as to our system.

While developing any software or any application, we usually follow SDLC (Software Development Life Cycle), which is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.

There are overall 6 stages of SDLC:

  • Planning and Requirement Analysis

  • Defining Requirements

  • Designing the Product Architecture

  • Building or Developing the Product

  • Testing the Product

  • Deployment in the Market and Maintenance

Here, for making the software more secured and safe to use, one must focus more on Development phase, as here we can analyze and identify where security issues can happen.

The respective authority / organization must apply some appropriate use policies and warnings from administrators before hand regarding possible outcomes of security threats in future. We can enfore such rules by adding them into terms and policies so that, when a person installs a software he/she must know about the rare possible chances of occurrence of attacks.

We can avoid these attacks if we make some modifications in the development phase. Here, instead of completely focusing on writing programs and creating algorithms, one has to focus on the security issues , to analyze with possibilities can attack occur and how to overcome it. As we analyze and identify the places where we need to improvise more in the software development, we must start working on it so that it can overcome all the drawbacks which it previous had. This process might take time, but it will not limit the usability of worker's system. This process of identifying and analyzing must be assigned to an expert and experienced candidate who can easily complete this process in a given amount of time. Once the development phase gets complete, one must try to test in different environments so as to ensure that it's risk free as well as compatible.

Hope I answered the questions.

If you have any doubts/queries, feel free to ask by commenting down below. I will respond within 24 hours

And if you like my answer, then please do upvote for it, your feedback really matters alot to me.

STAY HOME STAY SAFE


Related Solutions

Building security into the design phase of the software development lifecycle (SDLC) is important to be...
Building security into the design phase of the software development lifecycle (SDLC) is important to be successful in securing software. In this forum, you will research the best secure software design methodologies to prevent vulnerabilities and share your findings with the class. While a security method may work well for one organization, the same approach may not work well for other organizations. However, there should be some best practices we should follow to be successful in the SDLC phases Considering...
Q1: Discuss the unified process and its lifecycle regarding software development methodology for object-oriented development. Q1:...
Q1: Discuss the unified process and its lifecycle regarding software development methodology for object-oriented development. Q1: Discuss the unified process and its lifecycle regarding software development methodology for object-oriented development.
This week we are learning about atomic physics. At some point we talked about photons. Do...
This week we are learning about atomic physics. At some point we talked about photons. Do some research about photons and share your findings with your group about photons, what they are, why scientists introduced them, and what they do in our understandings of the nature of light.
In class we talked about the effects of cigarette smoking on birthweight. We defined a model...
In class we talked about the effects of cigarette smoking on birthweight. We defined a model E ( O | C = c ) = (β0)^1 + ((β1)^1 x c) where O is birthweight in ounces and C is cigarettes smoked per day. Suppose instead we used the model E(L|P =p)=(β0)^2 +((β1)^2 x p) where L is birthweight in pounds and P is packs of cigarettes smoked per day (there are 20 cigarettes in a pack). What is the relationship...
In this course, we have talked about four uses of empowerment and participation. We said they...
In this course, we have talked about four uses of empowerment and participation. We said they are part of delegation, used to overcome resistance to change, used to overcome resistance to control, and used for motivation. Now, explain why empowerment and participation work in all of these areas.
Q- We have discussed the topic “Rationale of Regulations “ in which we talked about the...
Q- We have discussed the topic “Rationale of Regulations “ in which we talked about the reasons for having regulations in a given country. Rationale of Regulations including issues of monopoly, windfall profits, externalities, social policy, information inadequacies, continuity and availability of services, anti-competitive behavior and predatory pricing, public goods and moral hazard, unequal bargaining power, scarcity and distribution of wealth, rationalization and coordination, and planning. Examine only one of the above Rationale of Regulations by providing a definition, an...
Below is the pseudocode for Quicksort and Partition that we talked about in class. As usual...
Below is the pseudocode for Quicksort and Partition that we talked about in class. As usual with recursive functions on arrays, we see the array indices s and e as arguments. Quicksort(A, s, e) sorts the part of the array between s and e inclusively. The initial call (that is, to sort the entire array) is Quicksort(A, 0, n − 1) QuickSort(A, s, e)   if s < e p = Partition (A, s, e) // Partition the array and return...
we talked earlier about measuring demand curves. how might we proceed if we want to measure...
we talked earlier about measuring demand curves. how might we proceed if we want to measure congestion Externalities associated with various outdoor recreation activities?
In the discussion for fatigue up to this point we have talked about the damaging effect...
In the discussion for fatigue up to this point we have talked about the damaging effect of the number of cycles of loading but we have not discussed about frequency (i.e. how often these loading cycles occur). Which class of materials do you think might be sensitive to the frequency of loading? Provide two physical mechanisms that may affect fatigue life (at least indirectly).
We talked about a diversity of respiratory strategies used by animals in class. One of the...
We talked about a diversity of respiratory strategies used by animals in class. One of the main differences between fish & frogs compared to reptiles, and mammals was that fish and frogs use buccal pumps and reptiles and mammals use suction pumps. How do buccal and suction pumps differ (please refer to where volume and pressure is changed and how it moves the respiratory medium through the respiratory system)? Explain how frogs use buccal pumps and mammals use suction pumps...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT