University of Kentucky Engineering Essay

User Generated

fcbbegul

Engineering

University of Kentucky

Description

1)400 words

Architecture and design represent one important side of delivering a security posture. That’s what this book is all about: How does one go about achieving an architecture and an architectural design that represent the security needs for a system ?

2)600 words


In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

Explanation & Answer:
1000 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

There you go buddy

Running Head: AGILE DEVELOPMENT AND SECURITY

Agile Development and Security
Student’s Name:
Institution Affiliation:
Date:

AGILE DEVELOPMENT AND SECURITY

2

Agile Development and Security.
There are rapid changes in business requirements as organizations cope with the
competitive and rapidly changing environment. This made agile software methodology a
preferred development model as it emphasizes efficiency and timely responsiveness to the
changing organizational needs. Agile is the most accepted and popular rapid application
development (RAD)model. Some of the major benefits of agile methodologies include reduced
risks in the development, increased customer satisfaction, faster development, high-quality
products and increased control of the project in software development. This makes it the most
preferred and widely adopted methodology by organizations (Cao et al., 2009) .
Despite its popularity, agile doesn't help developers address critical security concerns.
This, however, isn't a fault of agile; it is the outcome of how agile is used. Since security is a
very important aspect of the software, changes should be made to the development to ensure that
it maintains its agile element but address the security concerns. Security should, therefore, be
adopted in the agile development process as much as possible. With the agile methodology, the
user gives the system specifications to the programmers. Approved user stories are added to the
backlog which is a list of user stories that haven't been addressed. Most system developers
consider security as a nonfunctional requirement which is viewed as constraints on the backlog
(Azham et al., 2011). Since security is not expressed as user stories in the system, the perception
is that incorporating security mi...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags