SlideShare a Scribd company logo
There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method
to develop software step by step. It serves as a blue print to design software.
The stages help to design a software,the most important thing is to take security measures while
buidling itself because post production if we need to change anything it takes lot of money and
time.
Stage 1: Planning:
It is advised to address common threats and vulnerabilities that can come in the scope of the
project and plan accordingly beforehand. Most important theats to be addressed in this stage are
legal and compliance risks,process gaps etc.
Stage 2: Requirements and analysis:
Taking decisions about the selection of the favourable framworks,softwares.languages is very
crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be
used for your project and select one which has minimum threats. your team must be up-to-date
with software security standards to reduce insecure design and development practices. Business
security executive signs the full document and checks whether all the legal threats are
minimized.
Stage-3: Architecture and Design:
Design flaws if not properly identified beforehand can cause major threats to the whole project
and are very tough to repair. Use architecture risk analysis and other standard modeling
fundamental models to do threat modeling. these two can detect the design flaws. There are
many people working for the project in many roles so a nice technique is to document role
specific security training which can help the project to analyze threats accurately.
Stage-4: Development:
this phase is the most crucial phase of the project because it takes most of our time and
resources.By adhering to standard coding standards we can be safe against common threats. One
most important thing in this phase is the code reviews. Generally code is reviewed from time to
time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie
the code is reviewed constantly because by reviewing the code during long intervals it is difficult
for us to eliminate the problems in the code and the problem is embedded into the code deeply.
Stage-5 :Testing:
In this phase the bugs which the developers have overlooked are targetted. Specific testing tools
are used which subject the code to multiple verifications and look for bugs.Static and dynamic
testing tools are used to check the working of the code is real time scenarios.Penetration tests are
very powerful tests which can identify the authorize attacks,input handling,security posture etc.
Stage-6: Deployment/implementation:
In the deployment phase we need to take care such that the consumer gets all the prerequisite
information he needs.The detail plan of the environment where the product works,configuration
details,launch details must be properly addressed.It is also advised to lauch a standard Q and A
where the standard possible doubts the user might have will be addressed beforehand for
reference.
Mitigating personnel must be active in handling the requests by the customers in case of any
configuration problems. The customer tastes can be identified in this stage if taken proper data
from clients, this data can be used to design the products later in the future.
Stage 7: Maintainence:
In this stage the maintainence team must in one hand identify the future trends and technologies
and new requests in emerging technologies because technolgy always changes so integrating
with new tools,upgrading the technologies,implementing new features must be properly taken
care of.And on the other hand these changes must not affect the previous users of the
product.Compatabilty issues are to be properly analyzed and taken care of.
Solution
There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method
to develop software step by step. It serves as a blue print to design software.
The stages help to design a software,the most important thing is to take security measures while
buidling itself because post production if we need to change anything it takes lot of money and
time.
Stage 1: Planning:
It is advised to address common threats and vulnerabilities that can come in the scope of the
project and plan accordingly beforehand. Most important theats to be addressed in this stage are
legal and compliance risks,process gaps etc.
Stage 2: Requirements and analysis:
Taking decisions about the selection of the favourable framworks,softwares.languages is very
crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be
used for your project and select one which has minimum threats. your team must be up-to-date
with software security standards to reduce insecure design and development practices. Business
security executive signs the full document and checks whether all the legal threats are
minimized.
Stage-3: Architecture and Design:
Design flaws if not properly identified beforehand can cause major threats to the whole project
and are very tough to repair. Use architecture risk analysis and other standard modeling
fundamental models to do threat modeling. these two can detect the design flaws. There are
many people working for the project in many roles so a nice technique is to document role
specific security training which can help the project to analyze threats accurately.
Stage-4: Development:
this phase is the most crucial phase of the project because it takes most of our time and
resources.By adhering to standard coding standards we can be safe against common threats. One
most important thing in this phase is the code reviews. Generally code is reviewed from time to
time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie
the code is reviewed constantly because by reviewing the code during long intervals it is difficult
for us to eliminate the problems in the code and the problem is embedded into the code deeply.
Stage-5 :Testing:
In this phase the bugs which the developers have overlooked are targetted. Specific testing tools
are used which subject the code to multiple verifications and look for bugs.Static and dynamic
testing tools are used to check the working of the code is real time scenarios.Penetration tests are
very powerful tests which can identify the authorize attacks,input handling,security posture etc.
Stage-6: Deployment/implementation:
In the deployment phase we need to take care such that the consumer gets all the prerequisite
information he needs.The detail plan of the environment where the product works,configuration
details,launch details must be properly addressed.It is also advised to lauch a standard Q and A
where the standard possible doubts the user might have will be addressed beforehand for
reference.
Mitigating personnel must be active in handling the requests by the customers in case of any
configuration problems. The customer tastes can be identified in this stage if taken proper data
from clients, this data can be used to design the products later in the future.
Stage 7: Maintainence:
In this stage the maintainence team must in one hand identify the future trends and technologies
and new requests in emerging technologies because technolgy always changes so integrating
with new tools,upgrading the technologies,implementing new features must be properly taken
care of.And on the other hand these changes must not affect the previous users of the
product.Compatabilty issues are to be properly analyzed and taken care of.

More Related Content

Similar to There are 7 stages in Software Development LifeCycle. Coming to SDLC.pdf

Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx
14941
 
Lect3 conventional vs modern spm
Lect3 conventional vs modern spmLect3 conventional vs modern spm
Lect3 conventional vs modern spm
meena466141
 
20MCE14_Software Testing and Quality Assurance Notes.pdf
20MCE14_Software Testing and Quality Assurance Notes.pdf20MCE14_Software Testing and Quality Assurance Notes.pdf
20MCE14_Software Testing and Quality Assurance Notes.pdf
DSIVABALASELVAMANIMC
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1
Samura Daniel
 
16346915.ppt
16346915.ppt16346915.ppt
16346915.ppt
PunitGupta71
 
stm f.pdf
stm f.pdfstm f.pdf
stm f.pdf
HarshNagda5
 
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdfSystems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
aniyathikitchen
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
UTKARSHBHARDWAJ71
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
Sweta Kumari Barnwal
 
Software Engineering Overview
Software Engineering OverviewSoftware Engineering Overview
Software Engineering Overview
Prachi Sasankar
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
Software engineering
Software engineeringSoftware engineering
Software engineeringfaisalwajid
 
SIA-101-Final-_SDLC.pdf
SIA-101-Final-_SDLC.pdfSIA-101-Final-_SDLC.pdf
SIA-101-Final-_SDLC.pdf
JanreiDevillaTe
 
Notes of Software engineering and Project Management
Notes of Software engineering and Project ManagementNotes of Software engineering and Project Management
Notes of Software engineering and Project Management
NANDINI SHARMA
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
SoftServe
 
Comprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfComprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdf
Smith Daniel
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot
Harshil Barot
 
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJKunit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
AvijitChaudhuri3
 
functional testing
functional testing functional testing
functional testing
bharathanche
 

Similar to There are 7 stages in Software Development LifeCycle. Coming to SDLC.pdf (20)

Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx
 
Lect3 conventional vs modern spm
Lect3 conventional vs modern spmLect3 conventional vs modern spm
Lect3 conventional vs modern spm
 
20MCE14_Software Testing and Quality Assurance Notes.pdf
20MCE14_Software Testing and Quality Assurance Notes.pdf20MCE14_Software Testing and Quality Assurance Notes.pdf
20MCE14_Software Testing and Quality Assurance Notes.pdf
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1
 
16346915.ppt
16346915.ppt16346915.ppt
16346915.ppt
 
stm f.pdf
stm f.pdfstm f.pdf
stm f.pdf
 
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdfSystems Development Life Cycle(SDLC) is the step by step process whi.pdf
Systems Development Life Cycle(SDLC) is the step by step process whi.pdf
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software Engineering Overview
Software Engineering OverviewSoftware Engineering Overview
Software Engineering Overview
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
SIA-101-Final-_SDLC.pdf
SIA-101-Final-_SDLC.pdfSIA-101-Final-_SDLC.pdf
SIA-101-Final-_SDLC.pdf
 
Notes of Software engineering and Project Management
Notes of Software engineering and Project ManagementNotes of Software engineering and Project Management
Notes of Software engineering and Project Management
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
Comprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfComprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdf
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot
 
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJKunit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
unit2.pdfJgkcGkgcjkGKCJGgscdGSADKJgjsdkgKJAGSDJK
 
functional testing
functional testing functional testing
functional testing
 

More from anithareadymade

We will be making 4 classes Main - for testing the code Hi.pdf
 We will be making 4 classes Main - for testing the code Hi.pdf We will be making 4 classes Main - for testing the code Hi.pdf
We will be making 4 classes Main - for testing the code Hi.pdf
anithareadymade
 
#include stdio.hint main() {     int count;     FILE myFi.pdf
#include stdio.hint main() {     int count;     FILE myFi.pdf#include stdio.hint main() {     int count;     FILE myFi.pdf
#include stdio.hint main() {     int count;     FILE myFi.pdf
anithareadymade
 
MgO = 2416 = 1.5 .pdf
                     MgO = 2416 = 1.5                               .pdf                     MgO = 2416 = 1.5                               .pdf
MgO = 2416 = 1.5 .pdf
anithareadymade
 
ITs both by the way... it depends on the situatio.pdf
                     ITs both by the way... it depends on the situatio.pdf                     ITs both by the way... it depends on the situatio.pdf
ITs both by the way... it depends on the situatio.pdf
anithareadymade
 
I believe you are correct. The phase transfer cat.pdf
                     I believe you are correct. The phase transfer cat.pdf                     I believe you are correct. The phase transfer cat.pdf
I believe you are correct. The phase transfer cat.pdf
anithareadymade
 
The correct statements are1. the oxygen atom has a greater attrac.pdf
The correct statements are1. the oxygen atom has a greater attrac.pdfThe correct statements are1. the oxygen atom has a greater attrac.pdf
The correct statements are1. the oxygen atom has a greater attrac.pdf
anithareadymade
 
This is a bit complex to answer as we have HCl and NaOH present, the.pdf
This is a bit complex to answer as we have HCl and NaOH present, the.pdfThis is a bit complex to answer as we have HCl and NaOH present, the.pdf
This is a bit complex to answer as we have HCl and NaOH present, the.pdf
anithareadymade
 
The possible causative agent is Corynebacterium diptheriaeSore thr.pdf
The possible causative agent is Corynebacterium diptheriaeSore thr.pdfThe possible causative agent is Corynebacterium diptheriaeSore thr.pdf
The possible causative agent is Corynebacterium diptheriaeSore thr.pdf
anithareadymade
 
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdfThe answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
anithareadymade
 
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdfRainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
anithareadymade
 
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdfby taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
anithareadymade
 
import java.util.; public class DecimalToBinary { public stat.pdf
import java.util.; public class DecimalToBinary { public stat.pdfimport java.util.; public class DecimalToBinary { public stat.pdf
import java.util.; public class DecimalToBinary { public stat.pdf
anithareadymade
 
i did not get itSolutioni did not get it.pdf
i did not get itSolutioni did not get it.pdfi did not get itSolutioni did not get it.pdf
i did not get itSolutioni did not get it.pdf
anithareadymade
 
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdfHello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
anithareadymade
 
Here is the code for youimport java.util.Scanner; import java.u.pdf
Here is the code for youimport java.util.Scanner; import java.u.pdfHere is the code for youimport java.util.Scanner; import java.u.pdf
Here is the code for youimport java.util.Scanner; import java.u.pdf
anithareadymade
 
Following are the changes mentioned in bold in order to obtain the r.pdf
Following are the changes mentioned in bold in order to obtain the r.pdfFollowing are the changes mentioned in bold in order to obtain the r.pdf
Following are the changes mentioned in bold in order to obtain the r.pdf
anithareadymade
 
During meiosis, each member of a pair of genes tends to be randomly .pdf
During meiosis, each member of a pair of genes tends to be randomly .pdfDuring meiosis, each member of a pair of genes tends to be randomly .pdf
During meiosis, each member of a pair of genes tends to be randomly .pdf
anithareadymade
 
B parents marital statusSolutionB parents marital status.pdf
B parents marital statusSolutionB parents marital status.pdfB parents marital statusSolutionB parents marital status.pdf
B parents marital statusSolutionB parents marital status.pdf
anithareadymade
 
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdfANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
anithareadymade
 
Array- Arrays is a collection of data items with same data type and.pdf
Array- Arrays is a collection of data items with same data type and.pdfArray- Arrays is a collection of data items with same data type and.pdf
Array- Arrays is a collection of data items with same data type and.pdf
anithareadymade
 

More from anithareadymade (20)

We will be making 4 classes Main - for testing the code Hi.pdf
 We will be making 4 classes Main - for testing the code Hi.pdf We will be making 4 classes Main - for testing the code Hi.pdf
We will be making 4 classes Main - for testing the code Hi.pdf
 
#include stdio.hint main() {     int count;     FILE myFi.pdf
#include stdio.hint main() {     int count;     FILE myFi.pdf#include stdio.hint main() {     int count;     FILE myFi.pdf
#include stdio.hint main() {     int count;     FILE myFi.pdf
 
MgO = 2416 = 1.5 .pdf
                     MgO = 2416 = 1.5                               .pdf                     MgO = 2416 = 1.5                               .pdf
MgO = 2416 = 1.5 .pdf
 
ITs both by the way... it depends on the situatio.pdf
                     ITs both by the way... it depends on the situatio.pdf                     ITs both by the way... it depends on the situatio.pdf
ITs both by the way... it depends on the situatio.pdf
 
I believe you are correct. The phase transfer cat.pdf
                     I believe you are correct. The phase transfer cat.pdf                     I believe you are correct. The phase transfer cat.pdf
I believe you are correct. The phase transfer cat.pdf
 
The correct statements are1. the oxygen atom has a greater attrac.pdf
The correct statements are1. the oxygen atom has a greater attrac.pdfThe correct statements are1. the oxygen atom has a greater attrac.pdf
The correct statements are1. the oxygen atom has a greater attrac.pdf
 
This is a bit complex to answer as we have HCl and NaOH present, the.pdf
This is a bit complex to answer as we have HCl and NaOH present, the.pdfThis is a bit complex to answer as we have HCl and NaOH present, the.pdf
This is a bit complex to answer as we have HCl and NaOH present, the.pdf
 
The possible causative agent is Corynebacterium diptheriaeSore thr.pdf
The possible causative agent is Corynebacterium diptheriaeSore thr.pdfThe possible causative agent is Corynebacterium diptheriaeSore thr.pdf
The possible causative agent is Corynebacterium diptheriaeSore thr.pdf
 
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdfThe answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdf
 
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdfRainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
RainfallTest.java import java.util.Arrays; import java.util.Sc.pdf
 
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdfby taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdf
 
import java.util.; public class DecimalToBinary { public stat.pdf
import java.util.; public class DecimalToBinary { public stat.pdfimport java.util.; public class DecimalToBinary { public stat.pdf
import java.util.; public class DecimalToBinary { public stat.pdf
 
i did not get itSolutioni did not get it.pdf
i did not get itSolutioni did not get it.pdfi did not get itSolutioni did not get it.pdf
i did not get itSolutioni did not get it.pdf
 
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdfHello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdf
 
Here is the code for youimport java.util.Scanner; import java.u.pdf
Here is the code for youimport java.util.Scanner; import java.u.pdfHere is the code for youimport java.util.Scanner; import java.u.pdf
Here is the code for youimport java.util.Scanner; import java.u.pdf
 
Following are the changes mentioned in bold in order to obtain the r.pdf
Following are the changes mentioned in bold in order to obtain the r.pdfFollowing are the changes mentioned in bold in order to obtain the r.pdf
Following are the changes mentioned in bold in order to obtain the r.pdf
 
During meiosis, each member of a pair of genes tends to be randomly .pdf
During meiosis, each member of a pair of genes tends to be randomly .pdfDuring meiosis, each member of a pair of genes tends to be randomly .pdf
During meiosis, each member of a pair of genes tends to be randomly .pdf
 
B parents marital statusSolutionB parents marital status.pdf
B parents marital statusSolutionB parents marital status.pdfB parents marital statusSolutionB parents marital status.pdf
B parents marital statusSolutionB parents marital status.pdf
 
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdfANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdf
 
Array- Arrays is a collection of data items with same data type and.pdf
Array- Arrays is a collection of data items with same data type and.pdfArray- Arrays is a collection of data items with same data type and.pdf
Array- Arrays is a collection of data items with same data type and.pdf
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 

There are 7 stages in Software Development LifeCycle. Coming to SDLC.pdf

  • 1. There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method to develop software step by step. It serves as a blue print to design software. The stages help to design a software,the most important thing is to take security measures while buidling itself because post production if we need to change anything it takes lot of money and time. Stage 1: Planning: It is advised to address common threats and vulnerabilities that can come in the scope of the project and plan accordingly beforehand. Most important theats to be addressed in this stage are legal and compliance risks,process gaps etc. Stage 2: Requirements and analysis: Taking decisions about the selection of the favourable framworks,softwares.languages is very crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be used for your project and select one which has minimum threats. your team must be up-to-date with software security standards to reduce insecure design and development practices. Business security executive signs the full document and checks whether all the legal threats are minimized. Stage-3: Architecture and Design: Design flaws if not properly identified beforehand can cause major threats to the whole project and are very tough to repair. Use architecture risk analysis and other standard modeling fundamental models to do threat modeling. these two can detect the design flaws. There are many people working for the project in many roles so a nice technique is to document role specific security training which can help the project to analyze threats accurately. Stage-4: Development: this phase is the most crucial phase of the project because it takes most of our time and resources.By adhering to standard coding standards we can be safe against common threats. One most important thing in this phase is the code reviews. Generally code is reviewed from time to time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie the code is reviewed constantly because by reviewing the code during long intervals it is difficult for us to eliminate the problems in the code and the problem is embedded into the code deeply. Stage-5 :Testing: In this phase the bugs which the developers have overlooked are targetted. Specific testing tools are used which subject the code to multiple verifications and look for bugs.Static and dynamic testing tools are used to check the working of the code is real time scenarios.Penetration tests are very powerful tests which can identify the authorize attacks,input handling,security posture etc. Stage-6: Deployment/implementation:
  • 2. In the deployment phase we need to take care such that the consumer gets all the prerequisite information he needs.The detail plan of the environment where the product works,configuration details,launch details must be properly addressed.It is also advised to lauch a standard Q and A where the standard possible doubts the user might have will be addressed beforehand for reference. Mitigating personnel must be active in handling the requests by the customers in case of any configuration problems. The customer tastes can be identified in this stage if taken proper data from clients, this data can be used to design the products later in the future. Stage 7: Maintainence: In this stage the maintainence team must in one hand identify the future trends and technologies and new requests in emerging technologies because technolgy always changes so integrating with new tools,upgrading the technologies,implementing new features must be properly taken care of.And on the other hand these changes must not affect the previous users of the product.Compatabilty issues are to be properly analyzed and taken care of. Solution There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method to develop software step by step. It serves as a blue print to design software. The stages help to design a software,the most important thing is to take security measures while buidling itself because post production if we need to change anything it takes lot of money and time. Stage 1: Planning: It is advised to address common threats and vulnerabilities that can come in the scope of the project and plan accordingly beforehand. Most important theats to be addressed in this stage are legal and compliance risks,process gaps etc. Stage 2: Requirements and analysis: Taking decisions about the selection of the favourable framworks,softwares.languages is very crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be used for your project and select one which has minimum threats. your team must be up-to-date with software security standards to reduce insecure design and development practices. Business security executive signs the full document and checks whether all the legal threats are minimized. Stage-3: Architecture and Design: Design flaws if not properly identified beforehand can cause major threats to the whole project and are very tough to repair. Use architecture risk analysis and other standard modeling
  • 3. fundamental models to do threat modeling. these two can detect the design flaws. There are many people working for the project in many roles so a nice technique is to document role specific security training which can help the project to analyze threats accurately. Stage-4: Development: this phase is the most crucial phase of the project because it takes most of our time and resources.By adhering to standard coding standards we can be safe against common threats. One most important thing in this phase is the code reviews. Generally code is reviewed from time to time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie the code is reviewed constantly because by reviewing the code during long intervals it is difficult for us to eliminate the problems in the code and the problem is embedded into the code deeply. Stage-5 :Testing: In this phase the bugs which the developers have overlooked are targetted. Specific testing tools are used which subject the code to multiple verifications and look for bugs.Static and dynamic testing tools are used to check the working of the code is real time scenarios.Penetration tests are very powerful tests which can identify the authorize attacks,input handling,security posture etc. Stage-6: Deployment/implementation: In the deployment phase we need to take care such that the consumer gets all the prerequisite information he needs.The detail plan of the environment where the product works,configuration details,launch details must be properly addressed.It is also advised to lauch a standard Q and A where the standard possible doubts the user might have will be addressed beforehand for reference. Mitigating personnel must be active in handling the requests by the customers in case of any configuration problems. The customer tastes can be identified in this stage if taken proper data from clients, this data can be used to design the products later in the future. Stage 7: Maintainence: In this stage the maintainence team must in one hand identify the future trends and technologies and new requests in emerging technologies because technolgy always changes so integrating with new tools,upgrading the technologies,implementing new features must be properly taken care of.And on the other hand these changes must not affect the previous users of the product.Compatabilty issues are to be properly analyzed and taken care of.