2
Software Development Security Study Plan Software’s Importance Where Do We Place Security? Different Environments Demand Different Security Environment versus Application Functionality versus Security Implementation and Default Issues System Development Life Cycle Initiation Acquisition/Development Implementation Operations/Maintenance Disposal Software Development Life Cycle Project Management Requirements Gathering Phase Design Phase Development Phase Testing/Validation Phase Release/Maintenance Phase Secure Software Development Best Practices Software Development Models Build and Fix Model Waterfall Model V-Shaped Model (V-Model) Prototyping Incremental Model Spiral Model Rapid Application Development Agile Model Capability Maturity Model Integration Change Control Software Configuration Management Programming Languages and Concepts Assemblers, Compilers, Interpreters Object-Oriented Concepts Distributed Computing Distributed Computing Environment CORBA and ORBs COM and DCOM Java Platform, Enterprise Edition Service-Oriented Architecture

Software Development Security Study Plan

  • Upload
    kabitu

  • View
    1

  • Download
    0

Embed Size (px)

DESCRIPTION

Software Development Security Study Plan

Citation preview

Software Development Security Study PlanSoftwares Importance Where Do We Place Security? Different Environments Demand Different Security Environment versus Application Functionality versus Security Implementation and Default Issues System Development Life Cycle Initiation Acquisition/Development Implementation Operations/Maintenance Disposal Software Development Life Cycle Project Management Requirements Gathering Phase Design Phase Development Phase Testing/Validation Phase Release/Maintenance Phase Secure Software Development Best Practices Software Development Models Build and Fix Model Waterfall Model V-Shaped Model (V-Model) Prototyping Incremental Model Spiral Model Rapid Application Development Agile Model Capability Maturity Model Integration Change Control Software Configuration Management Programming Languages and Concepts Assemblers, Compilers, Interpreters Object-Oriented Concepts Distributed Computing Distributed Computing Environment CORBA and ORBs COM and DCOM Java Platform, Enterprise Edition Service-Oriented Architecture Mobile Code Java Applets ActiveX Controls Web Security Specific Threats for Web Environments Web Application Security Principles Database Management Database Management Software Database Models Database Programming Interfaces Relational Database Components Integrity Database Security Issues Data Warehousing and Data Mining Expert Systems/Knowledge-Based Systems Artificial Neural Networks Malicious Software (Malware) Viruses Worms Rootkit Spyware and Adware Botnets Logic Bombs Trojan Horses Antivirus Software Spam Detection Antimalware Programs