List and describe at least three software applications

Assignment Help Software Engineering
Reference no: EM131465097

Assignment: Software Assurance Techniques (U2IP)

Continue development of the software assurance guidelines document. New content will include guidelines for software assurance techniques as applied to the applications being developed by the company. This includes desktop, Web, and database applications.

One of the first tasks in the development of a software assurance guidelines document is to determine how software assurance techniques can be applied to the applications being developed by the company. These applications are usually in 3 categories: desktop applications, Web applications, and mobile applications. In addition, some of the applications will probably use a database for the storage of information. To create this part of the software assurance guidelines document, it is necessary to understand the security risks applicable to these types of applications, and identify how the applications can be secured.

For this assignment, you will identify the types of applications that are being produced by the company, and perform an evaluation of security risks applicable to these applications. You will then identify the types of software assurance techniques to be used for security risk mitigation in each of the software applications.

The project deliverables are as follows:

• Update the software assurance guidelines document title page with new date and project name.
• Update the previously completed sections based on instructor feedback.
• Complete the Software Assurance Techniques section.

o Analysis:

- List and describe at least 3 software applications that are produced by the organization. The applications must include at least 1 desktop application and 1 Web application.

- One of the applications must use a database for data storage.

- Identify at least 2 areas of each application that are at security risk, and describe the possible threats and their implications to the organization and to the client (in this case, the government).

- For each security risk, identify at least 1 software assurance technique that can be applied to reduce the security threat.

o Guidelines:

- Based on the analysis that was performed in the previous step, prepare a set of software assurance guidelines that the organization can use for all of the applications that it creates.

- Guidelines should be categorized by the type of software application and if the application is using a database for data storage or not.

- Guidelines should identify the software assurance technique to be applied, and they should provide sufficient detail to allow the software development group to implement the technique.

• Be sure to update your table of contents before submission.

Reference no: EM131465097

Questions Cloud

What specific leadership behaviors : What specific leadership behaviors do you think are needed to successfully address the implementation issues end of your project?
Calculate dcr for income producing property to be acquired : Calculate the DCR for an income producing property to be acquired at a price of $8M and a CAP of 6%.
How would i find the elasticity coefficient : How would I find the elasticity coefficient? If the old price is 4.00 and the new price is 6.00? The old revenue is 400.00 and the new revenue is 480.00?
Identify-analyse and apply contractual principles : Discuss whether any contract or contracts came into existence for the sale of Phillips auto repair business from Phillip to Tina.
List and describe at least three software applications : List and describe at least 3 software applications that are produced by the organization. Applications must include 1 desktop application and 1 Web application.
Identified currency costs as representing : The chapter on "why trade is not as high as it should be" identified currency costs as representing 14% of the border-related costs
Ardmore prison and warden duffy : If you were the correctional officer who had been hit with the bread slice, would you have reported the incident to your supervisor?
Effect of a tight monetary policy on interest rates : What is the effect of a tight monetary policy on interest rates, price level changes (inflation), and home price changes?
Compute the capability index : Case Detail: A spindle with specifications 20 ± 0.05 mm was machined in a lathe. The standard deviation of the spindle machined was found to be 0.25 mm.

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd