Design a Strategy for Securing the Operation of a Web Application Overview Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they...

1 answer below »
Assignment is attached


Design a Strategy for Securing the Operation of a Web Application Overview Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, “I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday.” Instructions The project specs require a multi-page design. The app will need to provide an interface to your company’s supply database for reading and entering data remotely as well the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open source software library modules. Fully discuss, in 3–5 pages, the process that your team would follow to create and deliver that Web application. 1. Provide at least six steps in the SDLC during which security strengthening behaviors will be applied. 2. Explain the specific security relevant actions taken during each step to include the people involved, the considerations taken and security assurance methods used. 3. Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method. 4. Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each. 5. Locate and use at least four quality sources in this assignment. The specific course learning outcome associated with this assignment is: · Propose a strategy for securing the operation of a Web application. Grading Rubric
Answered 6 days AfterAug 10, 2021

Answer To: Design a Strategy for Securing the Operation of a Web Application Overview Your team received an...

Shubham answered on Aug 16 2021
158 Votes
Six Steps in SDLC
Analysis: This process will provide a detailed analysis for the software and this can help in identification of overall requirements for the client (Blake, 2020). This step is required for making the adj
ustment and this will help in ensuring that security works properly at the end of the project.
Design: The analysis is completed and the next step is used for designing the network design that is required. It includes identification of architecture of the project. These steps can help in removing flaws for setting up the standard and it attempts to stick.
Development: This process starts with the actual software development process. It requires functionality and components of security that are created at the current stage.
Testing:- Testing is the stage that can help in assessing the security for finding errors. It includes development of the documents along with the information of bugs that are found during testing.
Implementation: This is the stage that plays a crucial role in running and development of the software that is accessed by all stakeholders (Blake, 2020). This can help in ensuring that complete level provides required security.
Maintenance: After the security is passed through multiple stages without any issues. The process of maintenance is processes and it is followed with upgrade and maintenance for time for adapting changes. This provides the relative information that will help in ensuring the overall purpose of the security system.
Security relevant actions
In the phase of analysis, it is important to identify the security considerations for functional requirements that are gathered for new release. It provides the ability for verification of contact information. The security consideration provides the information. In the phase of design, the security measures include identification of functional design that can help in retrieving the information from the database. It verifies the information from the database and it provides access to authentic users. In the development phase, the security includes validation of user input before processing the data (de Vicente Mohino et al. 2019). This requires checking the open source libraries for...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here