Scenario
You work for a consulting firm as a cybersecurity strategist specializing in software companies. You have been assigned to a new project. The board of directors of an organization mandated that security become a part of the software development life cycle used at the organization. The organization creates a software development system to build mobile applications for multiple mobile platforms. You will be presenting your strategy for implementing a secure software development life cycle (S-SDLC) to the research and development team.
Some assumptions you can make as you do this Assignment:
- Leadership and personnel are on board with the idea of incorporating security in every phase of the software development life cycle.
- The research and development teams are affected by this change. This includes the business analysts, software engineers, system test engineers, software quality assurance engineers, and technical support.
- The mobile software development system the software company builds has been in the market for three years.
- The mobile software development system the software company builds was developed in C#.
- The mobile software development system runs on the two latest major versions of Microsoft Windows and currently targets the latest version of Apple® iOS (handhelds and tablets) and Google™ Android™ (handhelds and tablets).
Assignment Instructions
In this assignment, you will
- Prepare an introduction that explains the importance of implementing secure software development.
- Define a secure software development life cycle (S-SDLC) the software company should adopt. T are several examples provided in this week’s readings and videos or you can find examples of your own through internet research.
- Discuss how security must be addressed in every phase of the S-SDLC and sufficiently explain how security is implemented in each phase of the SDLC.
- Provide a diagram of the secure software development life cycle (S-SDLC) that you are proposing.
- In addition to addressing adding security to the SDLC, discuss ongoing activities for threat assessment and vulnerability management in a software development environment.
- Create a high-level rollout plan to fully implement the S-SDLC.
As you complete this Assignment, be sure to outline any assumptions or constraints you may have.
Your Assignment will be in the form of a PowerPoint® presentation that includes embedded audio narration for each slide. In addition, each slide should have notes in APA form, as t is one person on the research and development team who is hearing impaired.
Assignment Requirements
- 5–8 slides, including embedded audio narration on each slide.
- Your final slide should present a list of resources you used (in APA format).
- At least 3 credible sources.
- Correct spelling and grammar
- Correct APA formatting
Last Completed Projects
topic title | academic level | Writer | delivered |
---|