-
Develop a 20 slide Power Point presentation explaining the role of Security Controls in Software Security using concepts discussed in the course. Focus your presentation on the steps in the SDL (security development lifecycle), including A1 – A5 and PRSA 1-5 (phases of the security lifecycle).
-
A white-hat hacking/vulnerability company contacts you claiming that they have discovered a zero-day attack vulnerability in your new health care software for clinics and hospitals. The vulnerability is not known to the public nor to the black-hat hacking community. And, the white-hat company is offering to sell you a fix. Based upon the course, what…
-
Currently, your company still uses an early generation fuzzer for security testing. An associate recommends purchasing a next-generation fuzzer that incorporates AI and has the ability to fix defects. How will you investigate these new fuzzers and build a case to management for a purchase? Based upon the course, what would be the advantages to…
-
You are assisting in the development of a new accounts payable program for internal use within your company. The major business stakeholder, the V.P. of Finance, wants to skip some of the security testing for the program to reduce costs. Her argument is that the program will be used internally, and rigorous testing is unnecessary.…
-
Your marketing manager comes to you and indicates that customers are complaining about the latest release of your database software. Customers claim that their clients can see each other’s data even though the software supposedly imposes a “Chinese Wall” to keep different clients’ data separate. Based upon the course, what are your Post-Release responses?
-
Chapters 3 and 4 introduced you to the Fourth Amendment and various aspects of searches and limited seizures, otherwise known as stops or detentions. With these course readings in mind, consider and respond to the following questions. In light of your reading in Chapter 4, do you think that profiling is a legitimate law enforcement…
-
Does the use of a drug sniffing dog during a routine traffic stop violate the Fourth Amendment? Would the result be different if an individual had to be transported to a location where a drug sniffing dog was available? When does the Fourth Amendment require warrants as a matter of law? What does the term…
-
Harrison Pharmaceuticals released a revolutionary new cancer drug with the potential to change the entire health landscape. With the need to promote the drug in new and existing territories, it had to increase its sales staff and train on all aspects of the drug’s efficacy. Because of industry regulations, the company designed a blended learning…
-
Software packages are available for common business processes like point of sale or tracking company financials. As a team, research a small business software package and summarize what the software does. Provide a link to the software package website. Explain how this software package would address your team’s business problem.
-
In terms of how the system helps users achieve business processes, discuss the impact of your IS on the Organization or on the Users. 2. How are business processes incorporated in your IS to gain a competitive advantage? 3. Make three concrete recommendations for improving your information system. At least one of the recommendations should…