Preview

Web Security Life Cycle

Good Essays
Open Document
Open Document
1010 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Security Life Cycle
Web Security Life Cycle
Software development life cycles are created to help guide businesses towards meeting specific desires and needs within their applications. They drive the steps used to meet best practices and standards that businesses are required to follow to function. SDLCs are made up of various different stages such as; assessments, application development, QA testing, deployments, etc. Best practices and standards dictate that implementing security within the various steps of an SDLC if not all of the steps will provide the best results that any business is trying to achieve. An SDLC can come in a few different models like a waterfall model, spiral model and a V-Model. This document will be used to describe and give a brief summary on many different processes.
Application Development: During the development of web applications, things such as poor error handling, and unsecure data transferring can plague the development. Poor error handling could result in malicious users finding much more information about a application than should be revealed and can use that information to gain access to unauthorized areas, while unsecure data transferring could result in data being stolen as it is broadcasted across a network.
QA/Testing: Security professionals that continually test software and web applications for malicious attacks or security flaws ensure that products will continue to work as desired. Examples of testing that could be used is Integration testing and black-box testing. Integration testing is when individual software modules are combined and tested as a group, while black-box testing is described as a method of software testing that examines the functionality of an application without knowing how it works and how it was coded.
Deployments: Monitoring of the deployment happens here, as well as searching for potential security threats and exploitable areas. Documenting how deployment has gone is also done. Deployment response time could become

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Best Essays

    The Software Development Life Cycle (SDLC) gives very definable goals regardless of the methodology used; the development process will have a planning and a testing phase whether it is Waterfall or Agile. At Smith Consulting (SC), projects begin with a project planning phase when SC selects team leaders and assigns jobs to team members based on their particular strengths. Then SC locks project requirements into an open-ended Agile process…

    • 3816 Words
    • 16 Pages
    Best Essays
  • Satisfactory Essays

    Xacc/210 Final Project

    • 522 Words
    • 3 Pages

    The system development life cycle, known as the SDLC, consist of six stages. A project team works through the stages of conceptualize, analyze, design, construct and implement a new information technology system. By using the system development life cycle it increases the accuracy and efficiency, also decreasing the odds of product failure.…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The activities that take place during each phase of the SDLC to ensure successful software development…

    • 1348 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    There are many techniques software developers should use while reviewing their code. These techniques will help ensure that the application is secured while also having an ease of use for the customers. Using these techniques will help bring the application to a secure point which will prevent unauthorized…

    • 343 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    As part of my job, I must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require I to do the following:…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The process of information-gathering is crucial to the success of this project. A plan must be followed and executed flawlessly to make sure the requirements and specifications have been defined. “Without a formalized, organized approach to developing information systems software [we] might see a project fail due to premature development of the software before all the functional requirements are clearly defined and agreed upon.” (Shelley 2004) The IT Team will use the Systems Development Cycle or SDLC with the waterfall methodology. Through this method, the team will be able to understand the user requirements and efficiency of the current system in comparison to related industry technological standards. The SDLC method is a tried and true approach for developing applications for companies that want to upgrade their systems.…

    • 1264 Words
    • 6 Pages
    Better Essays
  • Good Essays

    “Businesses and organizations use various types of information systems to support the many processes needed to carry out their business functions. Each of these information systems has a particular purpose or focus, and each has a life of its own. This “life of its own” concept is called the systems development life cycle or SDLC, and it includes the entire process of planning, building, deploying, using, updating, and maintaining an information system. The development of a new information system involves several different, but related activities. These activities, or phases, usually include planning, analysis, design, implementation, and maintenance/support. In other words, SDLC is a conceptual model that guides project management in information system development.”(Wikibooks)…

    • 429 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cis207

    • 776 Words
    • 4 Pages

    The System Development Life Cycle (SDLC) is a framework and set of processes to create or alter IT information systems, using best practices, methodologies, and models.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Sdlc Value

    • 1412 Words
    • 6 Pages

    Some SDLCs are based on a more predictive approach to the project, and other SDLCs are based on a more adaptive approach. System developers learn the SDLC phases and activities sequentially, based on the Waterfall model; in practice, however, the phases overlap and projects…

    • 1412 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Final Project

    • 2980 Words
    • 18 Pages

    Understand the life cycle of software development and how security can fit into the model.…

    • 2980 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Stability and Reliability, it has been proven that data loss has occurred mostly in windows based operating system environments rather than opposed to UNIX / LINUX based environments.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays

Related Topics