CYS 523 M2.7

Two part: First part is to post in discussion on the below instruction after i have posted i will provide jn the chat the second part
Second part will be to respond to two students post and one response to my post if the write on my post after i have posted. If not i will just provide another students post

Introduction

In your module notes, you learned about William and how he learned about the importance of application security while developing software.  In this activity, you will analyze the organizational concerns of properly building security in the SDLC phases.

Instructions

Read the following:

UC Berkeley Secure Coding Practice Guide https://security.berkeley.edu/secure-coding-practice-guidelines
Carnegie Mellon University Software Engineering Institute https://www.sei.cmu.edu/
Bug Bounty Program https://whatis.techtarget.com/definition/bug-bounty-program
Bug Bounty Program: Reduce Risk with Crowdsourced Security https://www.bugcrowd.com/resources/bug-bounty-program/
Next, review the six phases of the SDLC, and discuss which phase you feel would be the most costly to an organization as a result of neglecting security. What are common coding practices that are necessary for the phase you selected? How would a bug bounty program contribute to any of the phases of the SDLC?

In response to one another, select at least one of your peers who considered a different SDLC phase most costly to an organization. Discuss with one another why you might agree or disagree with their choice.

Leave a Reply

Your email address will not be published. Required fields are marked *