Scenario You work for a consulting firm as a cybersecurity strategist special

No Comments

Photo of author

By admin

 
Scenario
You work for a consulting firm as a cybersecurity strategist specializing in software companies. You have been assigned to a new project. The board of directors of an organization mandated that security become a part of the software development life cycle used at the organization. The organization creates a software development system to build mobile applications for multiple mobile platforms. You will be presenting your strategy for implementing a secure software development life cycle (S-SDLC) to the research and development team.
Some assumptions you can make as you do this Assignment:
Leadership and personnel are on board with the idea of incorporating security in every phase of the software development life cycle.
The research and development teams are affected by this change. This includes the business analysts, software engineers, system test engineers, software quality assurance engineers, and technical support.
The mobile software development system the software company builds has been in the market for three years.
The mobile software development system the software company builds was developed in C#.
The mobile software development system runs on the two latest major versions of Microsoft Windows and currently targets the latest version of Apple® iOS (handhelds and tablets) and Google™ Android™ (handhelds and tablets).
Assignment Instructions
In this assignment, you will
Prepare an introduction that explains the importance of implementing secure software development.
Define a secure software development life cycle (S-SDLC) the software company should adopt. There are several examples provided in this week’s readings and videos or you can find examples of your own through internet research.

Discuss how security must be addressed in every phase of the S-SDLC and sufficiently explain how security is implemented in each phase of the SDLC.
Provide a diagram of the secure software development life cycle (S-SDLC) that you are proposing.

In addition to addressing adding security to the SDLC, discuss ongoing activities for threat assessment and vulnerability management in a software development environment.
Create a high-level rollout plan to fully implement the S-SDLC.
As you complete this Assignment, be sure to outline any assumptions or constraints you may have.
Your Assignment will be in the form of a PowerPoint® presentation that includes embedded audio narration for each slide. In addition, each slide should have notes in APA form, as there is one person on the research and development team who is hearing impaired.
Assignment Requirements
5–8 slides, including embedded audio narration on each slide.
Your final slide should present a list of resources you used (in APA format).
At least 3 credible sources.
Correct spelling and grammar
Correct APA formatting

Leave a Comment