CIS 3615 Technology levels--snaptutorial.com

Page 1

CIS 3615 Week 1 Individual Work

For more classes visit www.snaptutorial.com CIS 3615 Week 1 Individual Work

********************************************************

CIS 3615 Week 3 Individual Work

For more classes visit www.snaptutorial.com Write a ½ to 1 page memo that explains factors to consider when selecting a programming language to develop secure software.


Conclude your memo with your recommendation of the programming language the team should use.

********************************************************

CIS 3615 Week 4 Individual Work

For more classes visit www.snaptutorial.com Instructional Objectives for this activity: Describe the purpose of conceptual, logical, and physical modeling.

In Secure Software Design, paragraph 5.12, page 131, Critical Thinking. Please address the following questions: 2, 4, 9 & 10.

********************************************************


CIS 3615 Week 5 Individual Work

For more classes visit www.snaptutorial.com What are the risks associated with directly executing user input? What are the minimum steps needed to parse user input before it is allowed to be used in execution?

What are the risks associated with inheritance in classes? Why are generic classes both useful and dangerous in programming?

Why should input that is not used in processing never be allowed to stay on the input stream?

What are the considerations of security you should include in planning which programming language to use in software development?

********************************************************


CIS 3615 Week 6 Individual Work

For more classes visit www.snaptutorial.com Write a 1 to 2 page memo describing additional security considerations you would add to a requirement definition in addition to those outlined in Chapter 7.

********************************************************

CIS 3615 Week 7 Individual Work

For more classes visit www.snaptutorial.com Summarize in your own words why it is beneficial to create a vulnerability map for a planned software system. What are the risks


when you do not consider the inherent system vulnerabilities in planning?

Why is it important to establish a ranking of vulnerabilities in a system? Use examples to show vulnerability priorities in action.

What is the purpose of the complete business system specification? Why is it important from the perspective of security?

Would there be risks associated with an attacker getting a copy of the complete business system specification? Justify your position and provide examples to support your argument.

********************************************************

CIS 3615 Week 8 Individual Work Memorandum

For more classes visit www.snaptutorial.com CIS 3615 Week 8 Individual Work Memorandum


********************************************************

CIS 3615 Week 10 Individual Work

For more classes visit www.snaptutorial.com How can the CIA triad of security be applied to an organization and not just a single system? Give examples to support your position.

What are some of the legal issues involved with privacy data? List at least three of these issues and the type of system that would need to consider the legal use of the data associated with the issue.

What privacy issues should be considered with employee access to software systems even when the software is housed within the organization?

What are the key factors involved in assessing the importance of a risk? Give examples to justify your ranking.


********************************************************

CIS 3615 Week 11 Individual Work

For more classes visit www.snaptutorial.com Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.

What are the components of two-factor authentication? Provide examples to support your answers.

Why are database views important and how are they beneficial in a DBMS?

Explain the advantages and disadvantages of operating in the cloud environment. How does this affect data security ant rest and in transit?


********************************************************


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.