SlideShare a Scribd company logo
1 of 1
What are the software security activities in the life cycle?
Solution
The software security activities in a life cycle include the following:
a.) Security engineering activities: These include activities to provide a proper solution such as
elicitation and definition,use of static analysis tools,secure testing,secure reviews and inspection
and etc.
b.) Security risk identification and management activities: The main purpose here is to identify
and manage the security risks.This activity drives othe rrisk activities such as security
engineering activities,project management activities,security assurance activities and etc.
c.) Security assurance activities: These include activities such as
verification,validation,reviews,evaluations and etc,
d.) Security organizational and project management activities: These include organizational
policies,management sponsorship,setting up organizational roles,oversight and etc. Project
management activities include planning and tracking resource allocationa and usage to make sure
that security engineering,security assurance and risk aidentification activities are planned and
controlled and also having the ability to track easily.

More Related Content

Similar to What are the software security activities in the life cycle-SolutionTh.docx

SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTIONSOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTIONFAREED UR RAHMAN .
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterDavid Sweigert
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
Reasons To Hire Security Architecture Consultancy Services
Reasons To Hire Security Architecture Consultancy ServicesReasons To Hire Security Architecture Consultancy Services
Reasons To Hire Security Architecture Consultancy ServicesCerebrum
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxkoushikDutta62
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptxdotco
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal ControlsBharath Rao
 
Secure in Software Development Life Cycle
Secure in Software Development Life CycleSecure in Software Development Life Cycle
Secure in Software Development Life Cyclejosheph max
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
Iso iec 12207 software life cycle processes
Iso  iec 12207 software life cycle processesIso  iec 12207 software life cycle processes
Iso iec 12207 software life cycle processesEpididimo
 
Project Management & Its Processes
Project Management & Its ProcessesProject Management & Its Processes
Project Management & Its Processes9 series
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptxatwine1
 
traffic management system in metro in details
traffic management system in metro  in detailstraffic management system in metro  in details
traffic management system in metro in detailsShubhamSharma775952
 
Introduction to Development Evaluation 发展评价导言
Introduction to Development Evaluation 发展评价导言Introduction to Development Evaluation 发展评价导言
Introduction to Development Evaluation 发展评价导言Dadang Solihin
 

Similar to What are the software security activities in the life cycle-SolutionTh.docx (20)

SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTIONSOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
 
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterSAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Audit system
Audit systemAudit system
Audit system
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Ict governance
Ict governanceIct governance
Ict governance
 
Reasons To Hire Security Architecture Consultancy Services
Reasons To Hire Security Architecture Consultancy ServicesReasons To Hire Security Architecture Consultancy Services
Reasons To Hire Security Architecture Consultancy Services
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Secure in Software Development Life Cycle
Secure in Software Development Life CycleSecure in Software Development Life Cycle
Secure in Software Development Life Cycle
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Iso iec 12207 software life cycle processes
Iso  iec 12207 software life cycle processesIso  iec 12207 software life cycle processes
Iso iec 12207 software life cycle processes
 
Project Management & Its Processes
Project Management & Its ProcessesProject Management & Its Processes
Project Management & Its Processes
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
 
Risk management
Risk managementRisk management
Risk management
 
traffic management system in metro in details
traffic management system in metro  in detailstraffic management system in metro  in details
traffic management system in metro in details
 
Introduction to Development Evaluation 发展评价导言
Introduction to Development Evaluation 发展评价导言Introduction to Development Evaluation 发展评价导言
Introduction to Development Evaluation 发展评价导言
 

More from loisj1

What are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxWhat are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxloisj1
 
What are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxWhat are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxloisj1
 
What are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxWhat are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxloisj1
 
What are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxWhat are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxloisj1
 
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxwhat are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxloisj1
 
What are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxWhat are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxloisj1
 
What are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxWhat are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxloisj1
 
What are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxWhat are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxloisj1
 
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxWhat are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxloisj1
 
What are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxWhat are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxloisj1
 
What are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxWhat are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxloisj1
 
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey  SolutionFor Dewey- learning wa.docxWhat are the four stages of John Dewey  SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docxloisj1
 
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxWhat are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxloisj1
 
What are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docxWhat are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docxloisj1
 
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxWhat are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxloisj1
 
What are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxWhat are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxloisj1
 
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxwhat are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxloisj1
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxloisj1
 
What are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxWhat are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxloisj1
 
What are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxWhat are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxloisj1
 

More from loisj1 (20)

What are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxWhat are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docx
 
What are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxWhat are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docx
 
What are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxWhat are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docx
 
What are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxWhat are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docx
 
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxwhat are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
 
What are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxWhat are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docx
 
What are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxWhat are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docx
 
What are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxWhat are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docx
 
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxWhat are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docx
 
What are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxWhat are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docx
 
What are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxWhat are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docx
 
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey  SolutionFor Dewey- learning wa.docxWhat are the four stages of John Dewey  SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
 
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxWhat are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docx
 
What are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docxWhat are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docx
 
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxWhat are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docx
 
What are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxWhat are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docx
 
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxwhat are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
 
What are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxWhat are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docx
 
What are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxWhat are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docx
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

What are the software security activities in the life cycle-SolutionTh.docx

  • 1. What are the software security activities in the life cycle? Solution The software security activities in a life cycle include the following: a.) Security engineering activities: These include activities to provide a proper solution such as elicitation and definition,use of static analysis tools,secure testing,secure reviews and inspection and etc. b.) Security risk identification and management activities: The main purpose here is to identify and manage the security risks.This activity drives othe rrisk activities such as security engineering activities,project management activities,security assurance activities and etc. c.) Security assurance activities: These include activities such as verification,validation,reviews,evaluations and etc, d.) Security organizational and project management activities: These include organizational policies,management sponsorship,setting up organizational roles,oversight and etc. Project management activities include planning and tracking resource allocationa and usage to make sure that security engineering,security assurance and risk aidentification activities are planned and controlled and also having the ability to track easily.