Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


Explanation of the software development life cycle, including your view on its importance to software security

Explanation of the software development life cycle, including your view on its importance to software security


All steps are related. You need to read the previous steps to gather information for the required assignment. My assigned organization is Cisco and everything leads back to the organization.

Step 6: Due08/24/22 by 9pm

Step 8: Due 08/28 by 6:00pm

Step 10: Due 09/02 by 6:00pm

Step 12: Due 09/06 by 6:00pm

Step 3: Explore the Software Development Life Cycle (SDLC)

Now that you understand SCRM, you will complete a software development life cycle assessment. The software development life cycle (SDLC) is a process used to develop, maintain, replace, and change software. The overall purpose of SDLC is to improve the quality of software through the development and implementation process.

Review topics from previous projects on systems, utilities, and application software, interaction of software, and creating a program.

As part of your assessment, include the following information:

Note how various entities are currently using SDLC to implement software.

Identify and take note of successful implementations, describing the results.

Identify software development methodologies for common software applications and cybersecurity standards organizations.

You will use the information that you gather during this step to complete your SDLC assessment.In the previous step, you explored SDLC, the ways other organizations are implementing it, and best practices. Now, you are ready to guide your own organization through the process of developing software.

Start by considering the needs of your organization.(CISCO) Currently, the accounting month-end closing procedures involve extracting data from the accounting database into spreadsheets, running macros within the spreadsheets, uploading new data into the accounting database, and emailing generated spreadsheet reports and word processing memos. Brenda, the director of Accounting Systems, would like this process automated without putting financial data at risk during or after the implementation.

Review topics on databases for operational data, database management systems, and how a database works.

  • Based on this needs analysis, you decide to focus on the SDLC maintenance phase:
  • Identify the key factors to successful maintenance and the implementation of this phase.
  • Identify potential obstacles to success and ways to anticipate and mitigate them.

You will use the information that you gather during this step to complete your SDLC assessment.

Step 5: Examine Software Assurance

Businesses depend on the safe operations of systems. The level of confidence a business or other entity has that its software is free from vulnerabilities is referred to as software assurance (SwA). As the final step before your assessment, research SwA and other topics related to preventing and fixing software vulnerabilities.

In your research, make sure to complete the following:

Evaluate the major steps, underlying theory, and relative usefulness of software security testing, white box and black box software security testing, the Common Criteria/Common Criteria Evaluation and Validation Scheme (CCEVS), and the Common Criteria (CC) for Information Technology Security Evaluation.

Identify and evaluate state and federal cybersecurity policies underlying the application, scope, and selection of secure software development methodologies.

Determine when to perform a risk analysis.

Evaluate security concerns that arise during the acceptance phase of software development.

Describe the testing and validation process from a cybersecurity policy standpoint.

Identify the ways in which SwA ensures trustworthiness, predictable execution, and conformance.

  • Identify SwA best practices.
  • Identify innovations in the provision of SwA that you have found in your research.

You will use the information that you gather during this step to complete your SDLC assessment.

Step 6: Prepare a Software Development Life Cycle Assessment

Integrating the information that you have gathered on software development in the last few steps, develop  a five-page summary assessment explanation of the software development life cycle, including your view on its importance to software security. This assessment will provide foundational support for your final recommendation.

Be sure to do the following:

Describe basic models and methodologies of the software development life cycle.

Identify a development methodology that fits your organization and explain why.

  • Describe the phases of the software life cycle.

List and discuss the security principles you would need to consider and explain how you would apply them throughout the software life cycle.

Describe the elements of a maturity model.

  • Submit your assessment for feedback.
  • Step 7: Compare and Contrast Software Development Methodologies
  • Now that you have completed your research on the SDLC, you are going to look into how to develop the software your organization needs.
  • You decide to consider various software development methodologies. Compare and contrast open source, commercial, and internally developed software methodologies, noting what cybersecurity issues each addresses.
  • Open-source software platforms are widely used and supported, and benefit from communities of creative and innovate thinkers. Learn about the open source development community (accountability and self-policing, development criteria, “ownership”) and the pros and cons of adopting open source platforms for corporate use.
  • You will use this information in the next step to develop a software development matrix.
  • Step 8: Submit a Software Development Matrix

Develop and submit a one-page matrix that compares and contrasts open source, commercial, and internally developed software development methodologies. You may want to use a table in Word or an Excel spreadsheet. Either will help you to succinctly present your ideas. Discuss the pros and cons of each to help inform your final recommendation. Include as criteria cost, software assurance needs and expectations, software assurance objectives, and a software assurance coding and development plan. You will use information from this matrix in your Software Recommendation Memo.

Submit the matrix for feedback.

Step 9: Evaluate Software Maintenance

Whether you are developing or purchasing software, the key to successful software installation and use is a maintenance plan that ensures updates are implemented in a timely manner and that guards against improper uses that could jeopardize the integrity of the software. Using key tenets of the maintenance elements of the SLDC, begin developing a software maintenance plan. In preparation for the maintenance plan, you will need to do the following:

Describe the software, the features, and the security improvements.

Develop a schedule to implement the recommended software.

Identify potential impacts to mission, risks, and likelihood of success

  • Step 10: Submit Software Maintenance Plan
    Using your findings from the previous step, develop and submit a two-page white paper for distribution to the team that will be responsible for implementing the plan. Since this white paper will help you to prepare the Software Recommendation Memo, it should do the following:
  • Describe the software features.
  • Describe the expected impacts on the mission.
  • Include the implementation schedule.
  • Submit the white paper to your instructor for review

Step 11: Weigh Software Options
You are finally ready to write your recommendation memo. Before you begin, look over your research one more time and evaluate your findings. Identify the software options to consider along with the associated costs and risks of those options. Your options should include procurement, development, and open source.Step 12: Submit the Software Recommendation Memo
Now that you have weighed the software options, write a memo recommending an approach to software acquisition for the organization Use your ideas from the matrix and white paper. Address it to procurement, with coordination through the chief information officer. This memo will educate leadership on the importance of making the right software decisions for the organization, so the memo will describe the software development life cycle (SDLC) and its applicability to the current needs of your organization. The three- to five-page memorandum should accomplish the following:

Articulate the software needs of the organization.

Identify the software options that best meet the organization’s needs.

Make a recommendation for your organization supported by a rationale.

Describe the key attributes of the software development life cycle (SDLC).

Describe the weaknesses of commonly used software (word processing, spreadsheets, email platforms).

Identify any known risks of your recommendation and describe supply chain risk management your organization could implement.

Detail the costs involved in your recommendation.

Cite contract language that would be used to ensure that supply chain, system, network, and operational security were met.

Submit the memo to your instructor.Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

6.1: Analyze secure software development methodologies and describe the cybersecurity issues that each methodology addresses.

6.4: Systems Life Cycle: Explain systems life cycle management concepts used to plan, develop, implement, operate, and maintain information systems.

9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management. 

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Fox Writers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Fox Writers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Fox Writers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Fox Writers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.