Information Technology Secure Software Practices and Testing Paper – Description
Secure Software Practices and Testing
Frequently, projects are completed because of the exhaustion of time or resources rather than the completion of the task in a secure manner. The delivery of core functions on its own can stretch the tasks to the extent that projects are declared complete before they are finished. Make use of the literature to include the consequences of insufficient SSDL and testing within your learning and your assignment.
An example of a valuable organization is the Open Web Application Security Project (OWASP). The OWASP Foundation (2019) provides a broad-based set of solutions and support on a global basis. Not only do they support a variety of needs, but they also provide public access to tools that provide useful solutions. They are organized into a series of projects that offer free solutions and training made available in multiple locations around the world. It would be important to explore their website should you not have prior experience or access to resources. A further respected organization is Veracode (2019).
Review this week’s resources carefully. You are expected to apply the information from these resources (as well as previously provided resources) when preparing your assignments.
REFERENCES
OWASP Foundation. (2019). The OWASP Foundation.
Veracode. (2019). Veracode: Veracode named a Gartner Magic Quadrant Leader in AST.
Assignment: Develop a Current System for Secure Software Development Practices and Testing
Instructions
For this assignment, you must build on your previous work by writing an essay that amplifies SSDL practices and SSDL testing. Your earlier work will have provided an overview of these areas as part of a broader review of current solutions and external influences from standards and federal sources. This assignment represents a granular focus on these two areas.
Your essay should contain an introduction and a conclusion. The content should focus on the development of a current system for secure software development and testing practices.
Remember to consider the signature assignment when completing your preparations for this assignment. In addition, strive to determine a gap in our knowledge that would provide a research opportunity.
References:
https://doaj.org/article/fa80a676b91e4b0cb20214067…
https://owasp.org/
The post Information Technology Secure Software Practices and Testing Paper first appeared on .