Computer Science, asked by balajianpat7, 4 months ago

as a developer,which of the following phase is not considered as a part of the secure development cycle of an application ​

Answers

Answered by sabyasachibehera94
12

Explanation:

Learn about the phases of a software development life cycle, plus how to build security in or take an existing SDLC to the next level: the secure SDLC.

What is the secure software development life cycle (SDLC)?

When it comes to creating, releasing, and maintaining functional software, most organizations have a well-oiled machine in place.

However, when it comes to securing that software, not so much. Many development teams still perceive security as interference—something that throws up hurdles and forces them to do rework, keeping them from getting cool new features to market.

But insecure software puts businesses at increasing risk. Cool new features aren’t going to protect you or your customers if your product offers exploitable vulnerabilities to hackers. Instead, your team needs to integrate security into the entire software development life cycle (SDLC) so that it enables, rather than inhibits, the delivery of high-quality, highly secure products to the market.

Answered by mahinderjeetkaur878
0

4. All of the above

The Phases In The Secure Development Cycle:

  • Requirements gathering and analysis: In this phase, developers work with stakeholders to identify and document the security requirements of the application. This includes understanding the application's intended functionality, users, data, and potential threats.
  • Threat modeling: In this phase, developers use threat modeling techniques to identify and prioritize potential threats to the application. This helps developers understand the attack surface of the application and identify areas that require additional security measures.
  • Secure design: In this phase, developers design the application with security in mind. This includes selecting appropriate security controls, such as access controls, encryption, and input validation, and incorporating them into the application's architecture.
  • Secure coding: In this phase, developers write code that implements the security controls identified in the previous phase. This includes following secure coding practices, such as avoiding buffer overflows, input validation, and proper error handling.
  • Security testing: In this phase, developers test the application for security vulnerabilities. This includes performing static code analysis, dynamic analysis, and penetration testing.
  • Deployment: In this phase, developers deploy the application to production environments while following security best practices. This includes ensuring that the environment is hardened, access controls are properly configured, and that the application is configured securely.
  • Maintenance and updates: In this phase, developers monitor the application for security vulnerabilities and apply updates and patches as needed. This includes ensuring that the application is up to date with the latest security patches, and that any new security vulnerabilities are promptly addressed.
  • Implementing a comprehensive secure development cycle can help developers ensure that their applications are secure and resistant to attacks. By following these steps, developers can help prevent security breaches and protect the privacy and data of their users.

The question you might looking for: -

As a developer,which of the following phase is not considered as a part of the secure development cycle of an application?

  1. Maintenance and updates
  2. Deployment
  3. Secure coding
  4. All of the above

To know more:

https://brainly.in/question/51156710?referrer=searchResults

https://brainly.in/question/34905085?referrer=searchResults

#SPJ3

Similar questions