110 likes | 119 Vues
For more classes visit<br>www.snaptutorial.com<br><br>CIS 3615 Week 1 Individual Work<br><br>
E N D
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 1 Individual Work For more classes visit www.snaptutorial.com CIS 3615 Week 1 Individual Work
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 3 Individual Work For more classes visit www.snaptutorial.com Write a ½ to 1 page memo that explains factors to consider when selecting a programming language to develop secure software.
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 4 Individual Work For more classes visit www.snaptutorial.com Instructional Objectives for this activity: Describe the purpose of conceptual, logical, and physical modeling. In Secure Software Design, paragraph 5.12, page 131, Critical Thinking. Please address the following
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 5 Individual Work For more classes visit www.snaptutorial.com What are the risks associated with directly executing user input? What are the minimum steps needed to parse user input before it is allowed to be used in execution? What are the risks associated with inheritance in classes? Why are generic classes both useful and dangerous in programming?
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 6 Individual Work For more classes visit www.snaptutorial.com Write a 1 to 2 page memo describing additional security considerations you would add to a requirement definition in addition to those outlined in Chapter 7.
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 7 Individual Work For more classes visit www.snaptutorial.com Summarize in your own words why it is beneficial to create a vulnerability map for a planned software system. What are the risks when you do not consider the inherent system vulnerabilities in planning?
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 8 Individual Work Memorandum For more classes visit www.snaptutorial.com CIS 3615 Week 8 Individual Work Memorandum
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 10 Individual Work For more classes visit www.snaptutorial.com How can the CIA triad of security be applied to an organization and not just a single system? Give examples to support your position.
CIS 3615 Technology levels--snaptutorial.com CIS 3615 Week 11 Individual Work For more classes visit www.snaptutorial.com Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.