CIS 3615 Help Bcome Exceptional/snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 3615 Help Bcome Exceptional/snaptutorial.com

Description:

For more classes visit www.snaptutorial.com Write a ½ to 1 page memo that explains factors to consider when selecting a programming language to develop secure software. – PowerPoint PPT presentation

Number of Views:0
Slides: 12
Provided by: apdlee

less

Transcript and Presenter's Notes

Title: CIS 3615 Help Bcome Exceptional/snaptutorial.com


1
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
The progress of the world depends almost entirely
upon education
2
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 1 Individual Work
CIS 3615 Week 1 Individual Work
3
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 3 Individual Work
Write a ½ to 1 page memo that explains factors to
consider when selecting a programming language to
develop secure software. Conclude your memo with
your recommendation of the programming language
the team should use.
4
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 4 Individual Work
Instructional Objectives for this activity
Describe the purpose of conceptual, logical, and
physical modeling. In Secure Software Design,
paragraph 5.12, page 131, Critical Thinking.
Please address the following questions 2, 4, 9
10.
5
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 5 Individual Work
What are the risks associated with directly
executing user input? What are the minimum steps
needed to parse user input before it is allowed
to be used in execution?  What are the risks
associated with inheritance in classes? Why are
generic classes both useful and dangerous in
programming?  Why should input that is not used
in processing never be allowed to stay on the
input stream?
6
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 6 Individual Work
Write a 1 to 2 page memo describing additional
security considerations you would add to a
requirement definition in addition to those
outlined in Chapter 7.
7
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 7 Individual Work
Summarize in your own words why it is beneficial
to create a vulnerability map for a planned
software system. What are the risks when you do
not consider the inherent system vulnerabilities
in planning?  Why is it important to establish a
ranking of vulnerabilities in a system? Use
examples to show vulnerability priorities in
action.
8
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 8 Individual Work Memorandum
CIS 3615 Week 8 Individual Work Memorandum
9
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 10 Individual Work
How can the CIA triad of security be applied to
an organization and not just a single system?
Give examples to support your position.  What are
some of the legal issues involved with privacy
data? List at least three of these issues and
the type of system that would need to consider
the legal use of the data associated with the
issue.
10
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
CIS 3615 Week 11 Individual Work
Describe threats that specifically target
confidentiality on a data system. Do not limit
yourself to the textbook for answers, and use
external resources to support your
conclusion.  What are the components of
two-factor authentication? Provide examples to
support your answers.  Why are database views
important and how are they beneficial in a DBMS?
11
CIS 3615
www.snaptutorial.com
CIS 3615 Help Bcome Exceptional
The progress of the world depends almost entirely
upon education
For more best Courses / Tutorials
Visit Now
www.snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com