Taloring A Clouded Data Security Life Cycle Essay

2071 Words9 Pages
Running Head: TAILORING A CLOUDED DATA SECURITY LIFE CYCLE 1

TAILORING A CLOUDED DATA SECURITY LIFE CYCLE 2

Tailoring a Clouded Data Security Life Cycle
Group 4

Security development life cycle
Security development lifecycle are the steps that software development goes through in a bid to come up with software that is able to withstand cyber security concerns such as worms and viruses, cyber-attacks, and loss of data. There are various steps outlined that can assist in the development of secure software (Dahal, 2012).
(See Appendix for FIGURE 1)
Software development methodologies and selection
Software development methodologies are the protocols embraced in the development of software. Depending on the preference of
…show more content…
Other methods include the waterfall, which is the traditional method and is almost become obsolete. This is because it was very expensive. It tangles the whole project and the team works in unity to accomplish the whole project. One mistake can drag the whole team behind, and it is difficult to debug errors. Feature driven method is another method which is costly because it focuses on providing the best of every part of the project. Process pride has a negative effect on timing and cost. Joint application development is the inverse of the agile software development strategy. It takes the project as a whole and work is assigned progressively without a work breakdown structure. It is good for very small software projects, but dangerous for lengthy software development projects (Kaufman, Perlman, & Speciner, 2002).
From the above information the crystal method which is part of the wider agile technology is the best method in software development. It allows a work breakdown structure that is similar to Microsoft’s security development life cycle. In addition, it allows for changes within the program since the iterations are assigned to smaller teams and are assessed for compatibility after submission. It is possible to identify any faults in the network security software and make changes before the developers go too far (Kaufman, Perlman, & Speciner, 2002).
Critical Infrastructure sectors and control

    More about Taloring A Clouded Data Security Life Cycle Essay

      Get Access