SlideShare a Scribd company logo
What are the software security activities in the life cycle?
Solution
The software security activities in a life cycle include the following:
a.) Security engineering activities: These include activities to provide a proper solution such as
elicitation and definition,use of static analysis tools,secure testing,secure reviews and inspection
and etc.
b.) Security risk identification and management activities: The main purpose here is to identify
and manage the security risks.This activity drives othe rrisk activities such as security
engineering activities,project management activities,security assurance activities and etc.
c.) Security assurance activities: These include activities such as
verification,validation,reviews,evaluations and etc,
d.) Security organizational and project management activities: These include organizational
policies,management sponsorship,setting up organizational roles,oversight and etc. Project
management activities include planning and tracking resource allocationa and usage to make sure
that security engineering,security assurance and risk aidentification activities are planned and
controlled and also having the ability to track easily.

More Related Content

PDF
CCISO_Certification_Training_Course-Outline.pdf
PPTX
Cyber Security Audit and Information Security.pptx
PDF
Cyber Security Risk Mitigation Checklist
PDF
Software Project Management | An Overview of the Software Project Management
DOCX
Roger Sloan Resume
PPTX
Planning for security and security audit process
PDF
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
DOCX
Audit system
CCISO_Certification_Training_Course-Outline.pdf
Cyber Security Audit and Information Security.pptx
Cyber Security Risk Mitigation Checklist
Software Project Management | An Overview of the Software Project Management
Roger Sloan Resume
Planning for security and security audit process
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Audit system

Similar to What are the software security activities in the life cycle-SolutionTh.docx (20)

DOCX
Question 11. Thoroughly discuss all of the elements associated w.docx
PDF
CISA Domain Wise Summary By InfosecTrain
PDF
CISA Revision material InfosecTrain .pdf
PPTX
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
PDF
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
PDF
Solve the exercise in security management.pdf
DOCX
Audit system
PDF
ISACA Cybersecurity Audit course brochure
PPTX
Security Plans & Policies in Cybersecurity.pptx
PPTX
Information system audit 2
DOCX
Ict governance
PPTX
Reasons To Hire Security Architecture Consultancy Services
PPTX
Cyber Security_Consultant_Nial Lande.pptx
PPTX
Project Management of Information Security area (Slide 2)
PPTX
crisc_wk_2a.pptx
DOCX
IS Audits and Internal Controls
PPTX
Activity 1- Project Management .power point
PDF
Secure in Software Development Life Cycle
PDF
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
Question 11. Thoroughly discuss all of the elements associated w.docx
CISA Domain Wise Summary By InfosecTrain
CISA Revision material InfosecTrain .pdf
SOFTWARE PROJECT MANAGEMENT SYSTEM IMPORTANT QUESTION
SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter
Solve the exercise in security management.pdf
Audit system
ISACA Cybersecurity Audit course brochure
Security Plans & Policies in Cybersecurity.pptx
Information system audit 2
Ict governance
Reasons To Hire Security Architecture Consultancy Services
Cyber Security_Consultant_Nial Lande.pptx
Project Management of Information Security area (Slide 2)
crisc_wk_2a.pptx
IS Audits and Internal Controls
Activity 1- Project Management .power point
Secure in Software Development Life Cycle
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS

More from loisj1 (20)

DOCX
What are the three reasons that the environment matters- Which of thos.docx
DOCX
What are the ps command line options to view information about threads.docx
DOCX
What are the steps a company cant take to protext itself against the s.docx
DOCX
What are the risks common to financial institutions- liquidity- exchan.docx
DOCX
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
DOCX
What are the primary keys of the following table- Explain why the foll.docx
DOCX
What are the major differences between capitalism- communism- and soci.docx
DOCX
What are the issues involved in measurement in organizational developm.docx
DOCX
What are the key differences between Windows- Apple- and Linux-Solutio.docx
DOCX
What are the implications of unstructured data to database design- Sup.docx
DOCX
What are the income levels and infrastructure development of Mobius SL.docx
DOCX
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
DOCX
What are the equilibrium concentrations- And how do you solve it- What.docx
DOCX
What are the essential outcomes of secure system retirement- Justify y.docx
DOCX
What are the Disadvantages of IFRS (International Financial Reporting.docx
DOCX
What are the differences between a linked list and a stack-SolutionA S.docx
DOCX
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
DOCX
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
DOCX
What are some tax consequences related to a qualified pension plan- (P.docx
DOCX
What are some primary reasons why an embedded system developer would u.docx
What are the three reasons that the environment matters- Which of thos.docx
What are the ps command line options to view information about threads.docx
What are the steps a company cant take to protext itself against the s.docx
What are the risks common to financial institutions- liquidity- exchan.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
What are the primary keys of the following table- Explain why the foll.docx
What are the major differences between capitalism- communism- and soci.docx
What are the issues involved in measurement in organizational developm.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the implications of unstructured data to database design- Sup.docx
What are the income levels and infrastructure development of Mobius SL.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the essential outcomes of secure system retirement- Justify y.docx
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the differences between a linked list and a stack-SolutionA S.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are some tax consequences related to a qualified pension plan- (P.docx
What are some primary reasons why an embedded system developer would u.docx

Recently uploaded (20)

PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
IGGE1 Understanding the Self1234567891011
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Lesson notes of climatology university.
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Cell Types and Its function , kingdom of life
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Digestion and Absorption of Carbohydrates, Proteina and Fats
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Chinmaya Tiranga quiz Grand Finale.pdf
History, Philosophy and sociology of education (1).pptx
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
IGGE1 Understanding the Self1234567891011
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Lesson notes of climatology university.
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
What if we spent less time fighting change, and more time building what’s rig...
Cell Types and Its function , kingdom of life
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين

What are the software security activities in the life cycle-SolutionTh.docx

  • 1. What are the software security activities in the life cycle? Solution The software security activities in a life cycle include the following: a.) Security engineering activities: These include activities to provide a proper solution such as elicitation and definition,use of static analysis tools,secure testing,secure reviews and inspection and etc. b.) Security risk identification and management activities: The main purpose here is to identify and manage the security risks.This activity drives othe rrisk activities such as security engineering activities,project management activities,security assurance activities and etc. c.) Security assurance activities: These include activities such as verification,validation,reviews,evaluations and etc, d.) Security organizational and project management activities: These include organizational policies,management sponsorship,setting up organizational roles,oversight and etc. Project management activities include planning and tracking resource allocationa and usage to make sure that security engineering,security assurance and risk aidentification activities are planned and controlled and also having the ability to track easily.