Evaluate which method of the secure sdlc will best serve

Assignment Help Management Information Sys
Reference no: EM132184348

Assignment : Best Coding Practices

You have been promoted to manager for the e-Commerce site for the company you made up in Assignment 1. You are concerned about the recent SQL attack. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the Website and database to be compromised by a SQL injection attack.

Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all of the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.

For Part I, you're going to write a memo to the CEO and CSO documenting your guidelines based on your findings when you evaluated your company's processes.

Justify why it is less expensive to build secure software than to correct security issues after a breach.

Outline the objectives and purpose of your company's "best secure coding practices" and explain how it will influence your division.

Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts into your existing processes.

Identify three resources that can be used as "reference material" and act as a beginner's guideline for new employees. Outline the importance of each resource and how each resource can assist new coders.

Use at least four quality references in this assignment. Note: Wikipedia and similar websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Test the links to ensure they work before submitting your paper

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow professional business language format.

Part II: PowerPoint Presentation

Create a PowerPoint presentation for your team in which you:

Outline the all of the major aspects of the Best Practice Coding guideline, including objectives, purpose, resources, and methodology. Note:

Please include your fictional company's name on each slide of your presentation. Remember, you're planning on using this experience when you take what you've learned out into the real world.

The specific course learning outcomes associated with this assignment are:

Analyze common Website attacks, weaknesses, and security best practices.

Describe the attributes and qualities of secure coding practices and the tools used to conduct security verification.

Analyze the role and importance of quality assurance testing for Web applications using a security lifecycle.

Use technology and information resources to research issues in securing Web-based applications.

Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Reference no: EM132184348

Questions Cloud

Discuss the difference between multicast and unicast routing : Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life.
Describe an efficient algorithm for computing : Describe an efficient algorithm for computing the diameter of T - What are the time and space requirements - Which graph representation would you use, adjacency
Applying for state or federal programs : Are some other options available to an individual, besides applying for state or federal programs?
Insurance coverage to all americans so costly : Why is the PPACA's attempt to extend insurance coverage to all Americans so costly?
Evaluate which method of the secure sdlc will best serve : Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing.
Factors that contribute to rising health costs : Briefly discuss the demand and supply factors that contribute to rising health costs. Specify how (a) asymmetric information
Unequal enjoyment and satisfaction : a. Endowing everyone with equal income will make for very unequal enjoyment and satisfaction.
Total income or according to the members needs : Should a nation's income be distributed to its members according to their contributions to the production of that total income or according to the members' need
Critique the choice implementing free high-speed internet : Critique the Choice implementing free high-speed Internet access for all guests in its Clarion Hotels and Comfort Suites from the security point of view.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What challenges are present in the scenario

What challenges are present in the scenario, and what are some steps that can be taken to address them?

  Where are potential areas of vulnerability in the scenario

What are the initial steps you would take when planning an enterprise-level risk assessment of technology tools and procedures?

  Discuss the conditions that lead to the freedom with fences

Can the "fences" stall the very idea the executive seeks to achieve? And if we cannot train to these ideals, but only hire to them.

  Describe cloud computing and web 2.0

A Discussion On Cloud Computing And Web 2.0 - Describe cloud computing and Web 2.0 and Explain how organizations use these tools.

  Discuss about the case given below

A new type of home-based elder care model, called Virtual Elder Care Home or Elder Care Home without Walls, has gained popularity in China.It features home care agencies providing a wide range of personal care and homemaker services in elders' hom..

  Discuss about the local health care organization

You work for a local health care organization. Your CEO feels she should have more of an impact on the legislative process and would like to know how she can have a more active role in shaping policy. She sent you an email asking you to explain th..

  What mhealth applicationsare you aware of

What mHealth applicationsare you aware of?What mHealth applications do you use?Are there mHealth applications that you would use if they existed? What are they? What are the benefits of mHealth for existing health care organizations? For consumers?

  What type of technology would you recommend for companies

Based on what you have learned on the WAN technologies, there are three different types of environments that need your help.

  Create and define roles and responsibilities

Create and define roles and responsibilities. Discuss current incident response process within Limetree Inc., including current shortcomings

  What are some of the technological ways that can be used

What are some of the technological ways that can be used to provide early or immediate detection of unauthorized access as it relates to physical security?

  Discuss about the big data and its business impacts

Discuss about the Information systems infrastructure: evolution and trends and Big data and its business impacts etc.

  Develop the measurable organizational value for this project

Write a policy statement by identifying the desired behavior and to whom the policy applies. Identify who is responsible to monitor that the policy is being enforced and identify how and to whom to contact if a disagreement arises.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd