Redesign to Eliminate Vulnerability Essay

User Generated

z6nn6

Writing

Description

Threats to applications or software require mitigation. Mitigation can be accomplished in four ways: redesign to eliminate vulnerability, apply a standard mitigation, invent a new mitigation, or accept the vulnerability.


Unformatted Attachment Preview

Running head: INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] Title of Paper Student’s Name Course Number (ORG500) – Name of Course (Foundations of Effective Management) Colorado State University – Global Campus Instructor’s Name August 6, 2010 1 INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 2 Title of Paper This is your introduction. If you need help writing this paper you can view the Writing an Effective Paper handout/tutorial which is located in the Library under the Library Tutorials. Please note: this template has not translated appropriately in some Microsoft products. Please be sure the paper you submit adheres to APA formatting standards. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim veniam, quis nos In a tsvulpate velt esse meleste at semper manet sola. UT lacreet dolore magna aliquam sic semp fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Level 1 Header (Example: Leadership and Diversity) The Level 1 Header is going to be a broad topic. The Level 2 Header is a subtopic under Level 1 and Level 3 Headers is a subtopic under Level 2 Header, and so on. Depending on your topic and your outline, you may not use all the Headers. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim veniam, quis nos In a tsvulpate velt esse meleste at semper manet sola. UT lacreet dolore magna aliquam sic semp fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 3 Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim Level 2 Header – This is a subtopic of Level 1 (Example: Leadership) Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim veniam, quis nos In a tsvulpate velt esse meleste at semper manet sola. UT lacreet dolore magna aliquam sic semp fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Level 3 Header - Indented, boldface, lowercase heading with a period. Begin body text after the period. This is a subtopic of Level 2 (Example: Team communication.). Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Level 4 Header - Indented, boldface, italicized, lowercase heading with a period. Begin body text after the period. This is a subtopic of Level 3 (Example: Public speaking.). Ultaceet dolore magna si napi. Wisi e nim ad minim. Ulta ceet dolore magna si napi. Wisi e nim admin im INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 4 veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim Level 5 - Indented, italicized, lowercase heading with a period. Begin body text after the period. This is a subtopic of Level 4 (Example: Posture and tone.). Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim veniam, quis nos In a tsvulpate velt esse meleste at semper manet sola. UT lacreet dolore magna aliquam sic semp fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim Level 2 Header (Example: Diversity) Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 5 tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim veniam, quis nos In a tsvulpate velt esse meleste at semper manet sola. UT lacreet dolore magna aliquam sic semp fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ulta ceet dolore magna si napi. Wisi e nim admin im veniam, quis nostrud. In atsvulpate velt esse meleste at semper manet sola. Ut lacreet dolore magna aliquam sic semper fi tyrannis erat volutpat. Wisi enim ad minim veniam. Dolore eu sata sfeugiat. Ipsum lorem vei illum sat dolor euis mod tincidunt vei auminiure dolor in esse. Ultaceet dolore magna si napi. Wisi e nim ad minim INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 6 References Carroll, A. B. (1979). A three-dimensional conceptual model of corporate performance. The Academy of Management Review, 4(4), 497. [This is a journal article citation. Articles from the Library databases are based on print journals so the citation will end with page numbers.] Collins, J. (2001). Good to great. New York, NY: HarperCollins Publishers Inc. [This is a book citation.] Epstein, M. J. (2008). Making sustainability work. San Francisco, CA: Greenleaf Publishing Limited. Epstein, M., & Roy, M. (2003). Improving sustainability performance: Specifying, implementing and measuring key principles. Journal of General Management, 29(1), 15-31. French, S. (2009). Critiquing the language of strategic management. The Journal of Management Development, 28(1), 6-17. doi: 10.1108/02621710910923836 [This is a journal article citation from a Library database. Include a doi number if available.] Ginter, P., Ruck, A., & Duncan, W. (1985). Planners’ perceptions of the strategic management process. Journal of Management Studies, 22(6), 581-596. Hollingworth, M. (2009, November/December). Building 360 organizational sustainability. Ivey Business Journal Online. Retrieved from http://www.iveybusinessjournal.com/article.asp?intArticle_ID=868 [This is a journal that is published online, so you would include the URL.] Reuters. (2010). Walgreens Co. (WAG.N). Retrieved from http://www.reuters.com/finance/stocks/companyProfile?symbol=WAG.N INSERT FIRST 50 CHARACTERS OF TITLE [double click to edit] 7 Walgreens. (2010a). Mission statement. Retrieved from http://news.walgreens.com/article_display.cfm?article_id=1042 [This is a website citation with a corporate author. If you retrieve information from various pages of this particular website, you need to cite each web page. However, because the author and the year will be exactly the same, the lowercase letters, “a,” “b,” etc. need to be added to the year. The in-text citation would be: (Walgreens, 2010a).] Walgreens. (2010b). Our past. Retrieved from http://www.walgreens.com/marketing/about/history/default.html
Purchase answer to see full attachment
Explanation & Answer:
4 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Running head: THREATS MITIGATION

Threats Mitigation

Student's Name
Department, Affiliations
Course Name
Professor's Name
Date

THREATS MITIGATION

2
Threats Mitigation
Introduction

Mitigation involves the development of actions that enhance the opportunities of
reducing vulnerabilities to the software in case of a breach. Also, it entails reducing risk effects
through prior preparation before they occur. The main objective of mitigation plans includes
minimizing, changing, or avoiding risk by preparing for the vulnerability and implementing
preventive measures. The most software development firm has a team that deals with
vulnerability mitigation by developing programs, creating strategies, and keeping track of things
that are likely to happen to ensure successful implementation of programs and projects.
Vulnerability mitigation teams accomplish their plans in four ways: redesign to eliminate the
vulnerability, apply standard mitigation, invent new mitigation, or accept the vulnerability. The
paper compares and contrasts the four mitigation options by examining their advantages and
disadvantages and showing where the SDLC process mitigation techniques should be applied for
maximum effectiveness.
Redesign to Eliminate Vulnerability
When software develops challenges that are hard to resolve, the team involved in the
software development will have to consider redesigning the software or the whole project to deal
with the vulnerabilities. Redesigning the software or the project involves a complete overhaul to
resolve or eliminate vulnerabilities for maximum efficiency. Some of the advantages associated
with redesigning to eliminate vulnerabilities include eliminating initial software exposures that
could create errors in the software or the project (Reis et al., 2021). The second advantage of
redesigning I allowing the software development team to create more durable software with a

THREATS MITIGATION

3

low risk of failure. Besides, redesigning software improves its reliability, performance, usability,
and robustness. The third advantage of redesigning is the addition, deletion, and modification of
various functionalities of the project or the software, thus redefining the software's specification.
Finally, redesigning software to eliminate vulnerability is less costly than creating new software.
However, redesigning is associated with several disadvantages (Rana, 2020). The redesign
process can introduce new errors or vulnerabilities that might affect performance efficiency.
Besides, there is an extent beyond which the redesign cannot happen; thus, minor errors are still
likely to be retained, creating vulnerabilities in the future. The previous positive aspects of the
software might become an issue after redesigning a software that crashed unexpectedly.

Apply a Standard Mitigation

Applying standard mitigation involves protecting a software or the project against
vulnerabilities known by the users or similar to the previous projects or software. The team
members in the software development are usually familiar with expected challenges from typical
projects or software or any errors that might occur. The first advantage of applying standard
mitigation is that the prior knowledge about the challenges or errors that can encounter the
software or the project enables users or the software development team to identify potential
vulnerabilities and their operational implications; thus, enabling them to avoid any vulnerability
option (Huang & Pearlson, 2021). Secondly, using the standard mitigation is advantageous
because it enhances faster rolling out; thus, saving costs. Also, because the mitigation has been
applied already in the previous software or project, the possibility of going wrong is low, and the
success rate is high. However, applying standard mitigation is associated with several
disadvantages, such as the knowledge being available to attackers; thus, using the knowledge to

THREATS MITIGATION

4

attack the software, making the success duration of this method undeterminable. The other
disadvantage is comparing software errors with previous ones; thus, focusing on errors they are
aware of and ignoring other errors might cause high-risk vulnerabilities in the software.

Invent a New Mitigation

When vulnerabilities are identified, then new mitigation strategies might be developed.
The invention of new mitigation strategies requires the software development team and users to
work together, identify potential challenges and develop solutions. The first advantage of
inventing new mitigation is the ability to come up with unique solutions and develop greater
knowledge while conducting the research to invent a new solution to the problem. Secondly,
attackers are not aware of the new inventions to mitigate vulnerabilities; thus, the unique
mitigation strategies will have a high success rate if implemented correctly. However, the
method is disadvantageous in various aspects (Mitre.org., 2015). Inventing new mitigation
methods needs a lot of time, effort, and money to conduct the right research; and can have a
chance of not giving or reaching the intended results or end up failing. Finally, any differences or
misunderstandings in the invention may lead to a substandard mitigation strategy. Therefore, the
team needs to work towards making a well thought or educated decision whether the technique
invented is effective or not before implementing it.

Accept the Vulnerability

Accepting vulnerability is a good mitigation strategy for dealing with fatal situations
when they happen. It is usually the last thing the team can do because the application will be
vulnerable to a known risk or vulnerability, and the attack can happen anytime. The advantage of

THREATS MITIGATION

5

accepting vulnerability is that the team is aware of the vulnerability, no much effort, time, or
money is needed in implementing the mitigation strategy. However, there are disadvantages
associated with accepting the vulnerability, such as putting the system at risk at any time because
it is prone to attackers (Flyoutsourcing, 2019). The software team will need to have individuals
monitoring the software and inform others about any unexpected changes. Accepting
vulnerability can cause an unexpected crash of the software, leading to loss of data and other
important information.

Where in SDLC process mitigation techniques should be applied for maximum
effectiveness

The Software Development Life Cycle (SDLC) involves several distinct stages, including
planning, design, analysis, testing, deployment, and maintenance. SDLC process is usually
vulnerable to risks from the start of the project till the final stage (Half, 2021). Every stage of
SDLC is vulnerable to different threats that may hinder the process from successful...

Related Tags