ed zilius bsa 357 week 1 ind

10
Stages of SDLC Software Development Life Cycle Ed Zilius BSA/375 December 10, 2012 MICHAEL TAOUSAKIS

Upload: edward-zilius

Post on 28-Apr-2015

259 views

Category:

Documents


2 download

TRANSCRIPT

Stages of SDLCSoftware Development Life Cycle

Ed Zilius BSA/375 December 10, 2012 MICHAEL TAOUSAKIS

O Introduction

There are six stages to SLDC 1. Project Initiation 2. Design Analysis (Functional Design) 3. System Design Specifications 4. Programming and Testing 5. Installation and Maintenance 6. Destruction phase In each phase, specific security related activities take place to ensure that security is built into the software

system under development.

Stage IO Project Initiation:

In the Project Initiation Phase of the SDLC, the company determines the need for the customer information system.

Stage IIO Design Analysis (Functional Design)

For the customers information system,some system functions include collecting verifying reporting customer information (input), data integrity (processing), and customer preferences (output).

Stage IIIO System Design Specifications

The Design

Functional

Design

from

the

Analysis Phase is translated into detailed specifications. The functional

need totranslated

have the customers reportsinto report layouts.

Stage IVO Programming and Testing

With the design specifications in hand, the focus of the SDLC moves to the

programmers. Programmers take thedetailed design specifications and begin to translate them into program code.

Stage VO Installation and Maintenance

In the Installation and Maintenance phase the system is fielded and enters the operation stage. and

maintenance (O&M)

Stage VIO Destruction

When your company upgrades thedatabase server, the development team makes sure that the disk drives on the old server are properly scrubbed of any sensitive customer

information

before the old server isdisposed.

repurposed or

ConclusionIf companies follow the SDLC phases andincorporate the appropriate security activities in each phase, systems can be developed in a secure manner.

ReferencesPurcell, J. E. (2012). Defining and Understanding Security in the Software. Retrieved from http://www.giac.org/cissp-papers/342.pdf