StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security in the Software Life Cycle - Essay Example

Cite this document
Summary
The goal of this essay is to briefly introduce the concept of security in terms of the software lifecycle. Furthermore, the paper outlines the main stages before implementing a particular security structure, such as engaging the business partner or client, identify applicable policies, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Security in the Software Life Cycle
Read Text Preview

Extract of sample "Security in the Software Life Cycle"

Download file to see previous pages

As mentioned earlier there are several phases of SDLC, the first phase has been the Initiation phase. The five security controls that are required in the Initiation phase are:The software is meant for serving the purpose of the client and hence from a developer point of view, it must be ensured that business or client functionality requirements have been fulfilled. Hence in the initiation phase, we begin with the requirement document. It's about engaging the business partner in assessing the security aspects and risk associated and at the same time what could be done so that the protection needs of the software can be covered.

The business in most of the cases wouldn't be aware of technical aspects of SDLC and integration of security in it. Hence a set of questionnaires are developed with the sole purpose being the transfer of security related technical issues of the software to the client while keeping things in the language of the business partner. The simpler language would enable developers in unraveling the security requirements of the proposed software.Software development in modern times is a combination of phases based on established norms.

The concepts of software engineering as well testing is very useful when policies and standards are taken into consideration. Requirement specification document must include the development model preferred like the waterfall model, liner model or spiral model etc. Use of automated audit history would also help to manage the required changes as well analysis of the current stage of the development of the software. Identify Applicable Regulatory, Compliance, and Privacy Requirements:In this networked world, regulatory requirements have international implications.

Service providers like www.amazon.com, www.ebay.com etc. have made their services available all across the world and hence they have to undertake both local and international considerations for regulatory, compliance and privacy requirements. In case of software for e-commerce, users are needed to provide their credit card details and the CVV number. Now, in this case, the website would need SSL certificate from VeriSign. Hence identification of the applicable regulatory, compliance and privacy requirements become a necessity so that software's portability could be without any physical and logical boundary.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security in the Software Life Cycle Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Security in the Software Life Cycle Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1527060-security-in-the-software-life-cycle
(Security in the Software Life Cycle Essay Example | Topics and Well Written Essays - 750 Words)
Security in the Software Life Cycle Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1527060-security-in-the-software-life-cycle.
“Security in the Software Life Cycle Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1527060-security-in-the-software-life-cycle.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security in the Software Life Cycle

The Systems Development Life Cycle

Software life cycle models itself describes the associated phases of the software life cycle and the order in which each of its phase will be executed (Shelly & Rosenblatt, 2011).... Describe the systems development life cycle as it pertains to both the development of a custom application and the selection of proprietary systems.... Systems development life cycle (SDLC) is basically a software development process which involves the formation or alteration of an information system....
5 Pages (1250 words) Research Paper

Planning Group Policy Software Deployment

Efficient Installation of Software Using Each Phase of System Development life cycle A software installation for the security of Intellectual property is an uphill task in lieu of the complexities associated with the installation phase.... For the efficient installation of software at controlled costs and keeping in view the above requirements of maintaining control on the installation phase, the System Development life cycle (SDLC) has to be incorporated.... In general, System Development life cycle (SDLC) has seven phases....
10 Pages (2500 words) Report

Software Development Life Cycle

The Information Systems Security Program Manager is an important role player in the SDLC project because he or she introduces an appropriate, structured methodology to help determine, assess and reduce the cases of information insecurity in the software that is made (Langer, 2012).... Software Development life cycle Name: Institution: Course: Tutor: Date: In development of organizations, there are times when the company has to improve its efficiency in service delivery through developing software that assists to ease the work....
3 Pages (750 words) Essay

Secure Software Development Approaches

The majority of software development firms, as well as individuals, believe that implementing security-related features of software or software development entirely is a post-development activity and it has nothing to do with the software development lifecycle.... This paper outlines some of the important aspects and factors that can affect the software development process.... The scope of this paper also covers a discussion on the reasons that can cause various security-based threats and issues within the software development process....
12 Pages (3000 words) Coursework

Development and Relevance of System Development Life Cycles

The term paper "Development and Relevance of System Development Life Cycles " states that the System Development life cycle (SDLC) is the method of developing information systems through investigation, analysis, design, implementation, and maintenance.... nbsp; The System Development life cycle (SDLC) is also known as Information Systems Development or Application Development.... If the management decision is to purchase commercial software rather than developing a new customized application, the system development life cycle in most parts remains the same....
11 Pages (2750 words) Term Paper

Comparative study of security in Windows and Linux

Broadly, an operating system is the software… The hardware must possess appropriate mechanism to guarantee the correct working of the system.... While OpenBSD is also generated over the UNIX framework, it is mostly developed using the security issues into account.... The team that developed this operating system claims that the system had been developed, keeping various security threats in mind.... At present it is considered to be number one with regards to the security measures among various other available options, since this system was developed through proactive security measures and implementation of cryptography....
16 Pages (4000 words) Research Paper

If the Software Patent Is Bad

"If the software Patent Is Bad" paper identifies the usefulness and disadvantage of a software patent for users and for developers.... With the inclusion of a few arguments, it would be easier to explore the purpose behind the software patent, its usefulness, and its disadvantages.... hellip; People have been arguing to end software patent But refer to the above conclusions, in majority cases, it has been observed that no doubt there is a risk involved in continuing software patent but it would be unethical to discontinue software patent....
9 Pages (2250 words) Coursework

Software Configuration Management Improvement and Security

s mentioned before software configuration helps with the management and tracking of the changes in the software.... To ensure that there is no lapse in security during the implementation of any change regarding the software of the system some steps, related to security, need to be included in the system development life cycle.... hellip; the software configuration teams would produce a report on a regular basis to keep the software configuration management team informed about any updates and if any defects are found in the change....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us