Date post: | 28-Apr-2015 |
Category: |
Documents |
Upload: | edward-zilius |
View: | 257 times |
Download: | 2 times |
Stages of SDLCSoftware Development Life Cycle
Ed Zilius BSA/375 December 10, 2012 MICHAEL TAOUSAKIS
O Introduction
There are six stages to SLDC 1. Project Initiation 2. Design Analysis (Functional Design) 3. System Design Specifications 4. Programming and Testing 5. Installation and Maintenance 6. Destruction phase In each phase, specific security related activities take place to ensure that security is built into the software
system under development.
Stage IO Project Initiation:
In the Project Initiation Phase of the SDLC, the company determines the need for the customer information system.
Stage IIO Design Analysis (Functional Design)
For the customers information system,some system functions include collecting verifying reporting customer information (input), data integrity (processing), and customer preferences (output).
Stage IIIO System Design Specifications
The Design
Functional
Design
from
the
Analysis Phase is translated into detailed specifications. The functional
need totranslated
have the customers reportsinto report layouts.
Stage IVO Programming and Testing
With the design specifications in hand, the focus of the SDLC moves to the
programmers. Programmers take thedetailed design specifications and begin to translate them into program code.
Stage VO Installation and Maintenance
In the Installation and Maintenance phase the system is fielded and enters the operation stage. and
maintenance (O&M)
Stage VIO Destruction
When your company upgrades thedatabase server, the development team makes sure that the disk drives on the old server are properly scrubbed of any sensitive customer
information
before the old server isdisposed.
repurposed or
ConclusionIf companies follow the SDLC phases andincorporate the appropriate security activities in each phase, systems can be developed in a secure manner.
ReferencesPurcell, J. E. (2012). Defining and Understanding Security in the Software. Retrieved from http://www.giac.org/cissp-papers/342.pdf