Security in the Software Life Cycle

High school
Essay
Miscellaneous
Pages 3 (753 words)
Download 0
The Centralized Credentials Quality Assurance System (CCQAS) requires integration of security into the software development life cycle (SDLC) in all the phases of SDLC. The preamble behind the introduction of security has been the timely as well proper identification and mitigation of possible vulnerabilities as well as misconfigurations in the design structure…

Introduction

As mentioned earlier there are several phases of SDLC, the first phase has been the Initiation phase. The five security controls that are required in the Initiation phase are:
The software is meant for serving the purpose of the client and hence from developer point of view it must be ensured that business or client functionality requirements have been fulfilled. Hence in the initiation phase, we begin with the requirement document. It's about engaging the business partner in assessing the security aspects and risk associated and at the same time what could be done so that the protection needs of the software can be covered. The business in most of the cases wouldn't be aware of technical aspects of SDLC and integration of security in it. Hence a set of questionnaires are developed with sole purpose being the transfer of security related technical issues of the software to the client while keeping things in the language of the business partner. The simpler language would enable developers in unraveling the security requirements of the proposed software.
Software development in modern times is a combinations of phases based of established norms. The concepts of software engineering as well testing are very useful when policies and standards are taken into consideration. ...
Download paper
Not exactly what you need?

Related papers

Data Backup and Life Cycle Restore in the Enterprises and Companies
w data base management systems (DBMS) perform the backup/restore operations, How about the automatic and manual backup, what's the data will been restored regarding the network limitation of bandwidth and work time and How we can construct a strong Disaster recovery plan. All these point will be discussed and covered in my research.…
Cost Life Cycle
There are techniques for estimating the cost of choosing the "wrong" project alternative. Deterministic techniques, such as sensitivity analysis or breakeven analysis, are easily done without the need for additional resources or information. They produce a single-point estimate of how uncertain input data affect the analysis outcome. Probabilistic techniques, on the other hand, quantify risk…
Life Cycle Analysis
In the end I have concluded this paper with my final words. The conclusion consisted of possible strategies or plans of action that the company could take to come out of the position it is in at the moment. In the end, I would like to state that the purpose of this paper was only academic and it was not intended to take any unlawful gain from the data used in this paper.…
Life Cycle Assessment
In these way sustainable enterprises, therefore is one that contributes to sustainable development by delivering simultaneously economic, social and environmental benefits so called triple bottom-line (Elkington, 1994). The global challenges associated with sustainability, viewed through the appropriate set of business lenses, can help to identify strategies and practices that contribute to a more…
Marketing - Product life cycle
Thus, product policy helps preserve a company's profitability as it manages every stage of the product life cycle in a meticulous manner for the purpose of avoiding the "decline" phase common to products brought to market with less attention to such details. A product policy is also useful to companies with a line of products if it includes an analysis of its product portfolio since this will help…
Security in the Software Life Cycle
As mentioned earlier there are several phases of SDLC, the first phase has been the Initiation phase. The five security controls that are required in the Initiation phase are:…
Software Development Life Cycle Models and Design Techniques
Let us take a look at the contemporary models being used by the software industry.…