The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,High School,College,University
| Teaching Since: | Apr 2017 |
| Last Sign in: | 359 Weeks Ago, 5 Days Ago |
| Questions Answered: | 6064 |
| Tutorials Posted: | 6070 |
Doctor of Education in Educational Leadership with a Specialization in Educational Technology
Phoniex University
Oct-1999 - Nov-2005
HR Executive
a21, Inc.
Nov-1998 - Dec-2005
Assignment 3: Building in Security
Information security professionals agree that when it comes to application development, it is critical to "bake in" or "build in" security. That means security should be part of the entire thought process, not something that is done after the application has been coded. The concept of baking in or building in security is commonly referred to as software assurance (SwA). The United States Department of Homeland Security (DHS) has a website dedicated to this concept. You can access the website using the following link:Â https://buildsecurityin.us-cert.gov/.
Assume that you are an information security professional with Blue-Calf Software Inc. Blue-Calf is a medium-sized software developer and contractor company for various federal US government agencies. As an information security professional, you have been assigned by your manager to create a report and a presentation on building security within the company. You may refer to the DHS page on this topic.
Tasks:
Create a 3- to 4-page training report, which covers these aspects:
Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.
Submission Details:
| Assignment 3 Grading Criteria |
Maximum Points
|
| Explained the importance of SwA clearly and accurately. |
16
|
| Described the principles of applying built-in security into coding projects. |
16
|
| Identified appropriate application coding approaches that can be used to ensure application security. |
24
|
| Described the benefits of identifying and securing application vulnerabilities. |
24
|
| Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources (i.e., APA); and displayed accurate spelling, grammar, and punctuation. |
20
|
| Total: |
100
|
Sol-----------uti-----------ons----------- fi-----------le ----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I-----------