Deliver this completed Practices for Secure Software Report documenting your process for writing secure communications and refactoring code that complies with software security testing protocols.
Respond to the steps outlined below and replace the bracketed text with your findings in your own words. If you choose to include images or supporting materials, be sure to insert them throughout.
[insert name here]
Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. Be sure to address the following:
[Include your findings here.]
Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.
[Insert screenshot(s) here.]
Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.
[Insert screenshot(s) here.]
Refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code to verify secure communication by typing https://localhost:8443/hash in a new browser window to demonstrate that the secure communication works successfully.
[Insert screenshot(s) here.]
Complete a secondary static testing of the refactored code using the dependency check tool to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.
[Insert screenshots here.]
Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.
[Insert screenshot(s) here.]
Discuss how the code has been refactored and how it complies with security testing protocols. Be sure to address the following:
When it comes to creating, releasing, and maintaining functional software, most organizations have a well-oiled machine in place.
However, when it comes to securing that software, not so much. Many development teams still perceive security as interference—something that throws up hurdles and forces them to do rework, keeping them from getting cool new features to market.
But insecure software puts businesses at increasing risk. Cool new features aren’t going to protect you or your customers if your product offers exploitable vulnerabilities to hackers. Instead, your team needs to integrate security into the entire software development life cycle (SDLC) so that it enables, rather than inhibits, the delivery of high-quality, highly secure products to the market.
A software development life cycle (SDLC) is a framework for the process of building an application from inception to decommission. Over the years, multiple SDLC models have emerged—from waterfall and iterative to, more recently, agile and CI/CD, which increase the speed and frequency of deployment.
In general, SDLCs include the following phases:
In the past, organizations usually performed security-related activities only as part of testing—at the end of the SDLC. As a result of this late-in-the-game technique, they wouldn’t find bugs, flaws, and other vulnerabilities until they were far more expensive and time-consuming to fix. Worse yet, they wouldn’t find any security vulnerabilities at all.
The Systems Sciences Institute at IBM reported that it cost six times more to fix a bug found during implementation than one identified during design. Furthermore, according to IBM, the cost to fix bugs found during the testing phase could be 15 times more than the cost of fixing those found during design.
Having great experience of working on various projects, academic writing tasks, essays, dissertations, proposals, presentations, spreadsheets, and reports. We have great research, communication, and problem-solving skills that distinguish us from others. We are responsible, committed, and dedicated to meeting the deadline by submitting high-quality work. We use SPSS, Eviews, and Stata that is all data analysis software for research purposes. We follow Harvard, MLA & APA referencing styles along with Endnote according to your requirements. We also check the plagiarism of our work on Turnitin, Grammarly, copy space, language space tool, and write check before submission that we can share with you for the originality of our work. Hopefully, we get this opportunity to work with you as we are sure it will be a good working experience.
Rest assured we will provide you “SUPREME QUALITY WORK” within your “GIVEN DEADLINE” with “PERFECT GRAMMAR” and “ZERO PLAGIARISM”. We have over 22,000 “EXCELLENT REVIEWS” which are a guarantee for our best Quality. Please see our profile and portfolio to assess our quality services. We usually produce over 50 pages of work every day with 100% accuracy.
Open chat and send us a message so we can finalize this deal within your budget.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more