Computer Science Homework Help

CMP 610 UMGC Software Development Life Cycle Project

 

Project 3: Software Weaknesses

Step 3: Explore the Software Development Life Cycle (SDLC) (1 page)

Now that you understand SCRM, you will complete a software development life cycle assessment. The software development life cycle (SDLC) is a process used to develop, maintain, replace, and change software. The overall purpose of SDLC is to improve the quality of software through the development and implementation process.

Review topics from previous projects on systems, utilities, and application software, interaction of software, and creating a program.

As part of your assessment, include the following information:

Step 4: Identify Key Implementation Attributes (1 page)

In the previous step, you explored SDLC, the ways other organizations are implementing it, and best practices. Now, you are ready to guide your own organization through the process of developing software.

Start by considering the needs of your organization. Currently, the accounting month-end closing procedures involve extracting data from the accounting database into spreadsheets, running macros within the spreadsheets, uploading new data into the accounting database, and emailing generated spreadsheet reports and word processing memos. Brenda, the director of Accounting Systems, would like this process automated without putting financial data at risk during or after the implementation.

Review topics on databases for operational data, database management systems, and how a database works.

Based on this needs analysis, you decide to focus on the SDLC maintenance phase:

  • Identify the key factors to successful maintenance and the implementation of this phase.
  • Identify potential obstacles to success and ways to anticipate and mitigate them.

Step 5: Examine Software Assurance (1 page)

Businesses depend on the safe operations of systems. The level of confidence a business or other entity has that its software is free from vulnerabilities is referred to as software assurance (SwA). As the final step before your assessment, research SwA and other topics related to preventing and fixing software vulnerabilities.

In your research, make sure to complete the following:

  • Evaluate the major steps, underlying theory, and relative usefulness of software security testing, white box and black box software security testing, the Common Criteria/Common Criteria Evaluation and Validation Scheme (CCEVS), and the Common Criteria (CC) for Information Technology Security Evaluation.
  • Identify and evaluate state and federal cybersecurity policies underlying the application, scope, and selection of secure software development methodologies.
  • Determine when to perform a risk analysis.
  • Evaluate security concerns that arise during the acceptance phase of software development.
  • Describe the testing and validation process from a cybersecurity policy standpoint.
  • Identify the ways in which SwA ensures trustworthiness, predictable execution, and conformance.
  • Identify SwA best practices.
  • Identify innovations in the provision of SwA that you have found in your research.

Step 6: Prepare a Software Development Life Cycle Assessment (5 pages)

Integrating the information that you have gathered on software development in the last few steps, develop either a five-page summary assessment or a 10-minute video explanation of the software development life cycle, including your view on its importance to software security. This assessment will provide foundational support for your final recommendation.

Be sure to do the following:

  • Describe basic models and methodologies of the software development life cycle.
  • Identify a development methodology that fits your organization and explain why.
  • Describe the phases of the software life cycle.
  • List and discuss the security principles you would need to consider and explain how you would apply them throughout the software life cycle.
  • Describe the elements of a maturity model

GUIDANCE IN COMPLETING STEP 6

Five-page summary

-Introduction

-Phases of SDLC (1 para)

-Basic models and methodology (4-5 paragraphs)

-Security principals you need to consider and explain how you would apply them (1 para)

-Elements of a Capability Maturity Model (1 para)

-Conclusion

-References