Software Security Lifecycle Case Study

Software Security Lifecycle Case Study

** Please have experience in the software security lifecycle **

The subject is “The Software Security Lifecycle” and this research report focuses on analysing a given case study (a public event where a company had a data breach) and provide analysis on why the data breach occurred, what this shows about their current SDLC and proposed solutions to ensure security is incorporated into the SDLC.

I have been assigned a case study, and will provide it once I have selected a writer. Alternatively, if you would like you can ask.

I have already completed two pieces of work regarding this case study, which will provide you an easy ‘foundation’ to build off for the final report.

* References need to include peer-reviewed journals/quality scholarly articles”

Further information: (“MONO” will be substituted for the case study)
You have been recently appointed as a Chief Information Security Officer (CISO) for one of the
largest software development organisations, “MONO Ltd”.
Your CEO had a meeting with you and has informed you about complaints from a customer,
regarding a series of cyber-attacks that occurred last month on one of the MONO’s latest
software applications that they are currently using.
Your CEO understands the severity of the situation and that this might cause millions of dollars
in damages, as well as damage the company’s reputation. The CEO would like to prevent these
situations from occurring in the future.
MONO has invested into your professional development and sent you to a Master level cybersecurity
course that you have successfully completed by gaining knowledge on how to build
security inside the software development lifecycle to secure software applications. Your CEO has asked you to work within your team, investigate where security breaches are
coming from in the software development, perform cause analyses, conduct research, and
provide the CEO with a report titled: “Response to the Current Security breach: Towards
Developing Secure Applications at MONO Ltd”, highlighting your investigations, analysis and
proposed solutions.

AIM:
Show an in-depth understanding and make a realistic assessment of the security implications within
software applications development
• Apply the knowledge and skills they have gained on building security into SDLC
• Show an understanding of and apply secure engineering approaches, different methodologies and
techniques from the materials presented in the course
• Ability to engage in ongoing learning and produce effective outcome in the form of research report

FORMAT:
The Research Report should be a single Microsoft Word document (or a PDF) in no less than 11 point
font and must be 1.5 line spaced. It should have:
• a front cover with your student number, course name, assignment title and the word count;
• a table of contents;
• four compulsory sections
• Executive Summary (not an abstract)
• Introduction (background information; significance of the subject matter and importance to
you)
• Main Body (discussion and analysis)
• Conclusion and recommendations
• all in-text citations clearly referenced using the Harvard Referencing style
• a reference list that includes at least 10-12 good scholarly articles in your report

Marking criteria:
Ability to articulate, discuss and present the issues involved in the process of developing
secure software throughout SDLC
Ability to integrate and interrelate concepts, information and processes from diverse
sources to focus on building security in within SDLC
Ability and confidence to take initiatives and work individually on resolving complex
problems on embedding security into SDLC
Ability to engage in ongoing learning and produce effective outcomes in the form of
research reports and presentation slides