Critical Thinking Assignment: SDLC

Anonymous

Question Description

Scenario:

You are the Information Security manager of a regional bank based in Abu Dhabi. Your team has been funded to develop a customer-facing, cognitive system that interactively answers customer questions online. The conditions of funding include that the SDLC must incorporate security best practices in all phases of the life cycle.

Directions
Write a paper that includes the following:

  • A description of the four SDLC stages of your end-to-end project
  • A detailed explanation of the security measures you would incorporate into each stage of the SDLC in order to ensure security best practices are followed all along the life cycle of the project
  • Include a description of under what circumstances you would employ HTTP protocol versus an SSL protocol.

Keep in mind, we are most interested in your ability to describe the SDLC stages and the steps you would take to enforce security during each stage. Use diagrams, where appropriate.

Deliverables:

  • Your paper should be 2-3 pages in length, not including the title and reference pages.
  • You must include a minimum of two (2) credible sources and information from the module to support your writing. The Saudi Digital Library is a good source for resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Tutor Answer

NicholasI
School: University of Maryland

Hi, kindly find attached

Running Head: SOFTWARE DEVELOPMENT LIFE CYCLE

Software Development Life Cycle
Student’s Name
Institution
Date

1

SOFTWARE DEVELOPMENT LIFE CYCLE

2

Software Development Life Cycle

SDLC (Software Development Life Cycle) model describes the stages a newly designed
software goes through before releasing into the market. There are five stages in the SDLC. Each
phase of the life cycle compliments the next stage. The results obtained in in one stage are useful
in the next stage. There are six stages in the SDLC. They include requirement gathering and
analysis, design, coding, testing, and deployment (Janes & Succi, 2014). As a software developer,
there is need to take appropriate security measures at each stage. This paper comprehensively
analyses that stages of the SDLC and the security measures I as a software developer I would put
in place in each stage.
Requirement gathering and analy...

flag Report DMCA
Review

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors