Identify Key Implementation Attributes step 2 assignment

This is a paper that is focusing on the student to Identify Key Implementation Attributes step 2 assignment. The paper also provides additional information to use in the writing and submission of the assignment paper well and precisely.

Identify Key Implementation Attributes step 2 assignment

Step 1: Explore the Software Development Life Cycle (SDLC)
Now that you understand SCRM, you will complete a software development life cycle assessment. The software development life cycle (SDLC) is a process used to develop, maintain, replace, and change software. The overall purpose of SDLC is to improve the quality of software through the development and implementation process.
As part of your assessment, include the following information:
Note how various entities are currently using SDLC to implement software.
Identify and take note of successful implementations, describing the results.
Identify software development methodologies for common software applications and cybersecurity standards organizations.
You will use the information that you gather during this step to complete your SDLC assessment.

Step 2: Identify Key Implementation Attributes
In the previous step, you explored SDLC, the ways other organizations are implementing it, and best practices. Now, you are ready to guide your own organization through the process of developing software.
Start by considering the needs of your organization. Currently, the accounting month-end closing procedures involve extracting data from the accounting database into spreadsheets, running macros within the spreadsheets, uploading new data into the accounting database, and emailing generated spreadsheet reports and word processing memos.

Brenda, the director of Accounting Systems, would like this process automated without putting financial data at risk during or after the implementation.
Review topics on databases for operational data, database management systems, and how a database works.
Based on this needs analysis, you decide to focus on the SDLC maintenance phase:
●    Identify the key factors to successful maintenance and the implementation of this phase.
●    Identify potential obstacles to success and ways to anticipate and mitigate them.
You will use the information that you gather during this step to complete your SDLC assessment.

Explore the Software Development Life Cycle step 1

Step 3: Examine Software Assurance
Businesses depend on the safe operations of systems. The level of confidence a business or other entity has that its software is free from vulnerabilities is referred to as software assurance (SwA). As the final step before your assessment, research SwA and other topics related to preventing and fixing software vulnerabilities.
In your research, make sure to complete the following:

●    Evaluate the major steps, underlying theory, and relative usefulness of software security testing, white box and black box software security testing, the Common Criteria/Common Criteria Evaluation and Validation Scheme (CCEVS), and the Common Criteria (CC) for Information Technology Security Evaluation.
Identify and evaluate state and federal cybersecurity policies underlying the application, scope, and selection of secure software development methodologies.
Determine when to perform a risk analysis.
Evaluate security concerns that arise during the acceptance phase of software development.
Describe the testing and validation process from a cybersecurity policy standpoint.
Identify the ways in which SwA ensures trustworthiness, predictable execution, and conformance.
Identify SwA best practices.
Lastly, identify innovations in the provision of SwA that you have found in your research.
You will use the information that you gather during this step to complete your SDLC assessment.


Step 4: Prepare a Software Development Life Cycle Assessment
Integrating the information that you have gathered on software development in the last few steps, develop  a five-page summary assessment  explanation of the software development life cycle, including your view on its importance to software security. This assessment will provide foundational support for your final recommendation.
Be sure to do the following:
Describe basic models and methodologies of the software development life cycle.
Identify a development methodology that fits your organization and explain why.
Describe the phases of the software life cycle.
List and discuss the security principles you would need to consider and explain how you would apply them throughout the software life cycle.
Describe the elements of a maturity model.