• Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact
Coursework Artifact
csol_560_final_project.pdf
File Size: 764 kb
File Type: pdf
Download File

Cybersecurity has become crucial to sustainable business operations as data value increases daily. Organizations must assess vulnerabilities to understand security weaknesses in their environment better. I was prompted to select the final project from CSOL 560 as a course artifact because this piece provides a better understanding of identifying risks and metrics within information systems and ways to outline strategies and mitigation processes to sustain security (Rosencrance, n.d.). 
Cybersecurity leaders are professionals who ought to understand processes and practices to specify, design, and implement an overarching security strategy to mitigate risks to their environment's business operations. Our ethical obligation is also to deliver security at the core of processes containing employee and consumer data.

​
Reflections
The most crucial aspect of secure software lies in the development lifecycle by embedding secure processes and practices to specify, design, and develop software. Embedding security in the development lifecycle could eliminate vulnerabilities effortlessly and more cost-efficiently.
Without a doubt, in developing software systems determining which threats pose the most significant risk is challenging, yet it’s critical to build secure software. But if security is the core of the development process, it could result in preventing external threats and developing secure software. The final project from CSOL 560 illustrates the relevance of assessing vulnerabilities to build security into internal network infrastructure and the procedures and policies governing information systems and use within the business. 

Key insights 

  • Putting security under the spotlight ensures confidentiality, integrity, and availability. 
  • Under investing in cybersecurity will most likely result in financial losses and a damaged reputation. 
  • The quicker vulnerabilities are discovered in software development, the safer the enterprise and applications (Gordon, 2021). 

Applications, systems, and networks are under constant attack; it’s our ethical responsibility to ensure attack information is abruptly disclosed upon detection. 
At the same time, professionally, we are obligated to get software solutions to the market fast, with all the features planned while maintaining a high level of security.

​

References
​
Gordon, D. (2021, May 26). Secure Software Development: Why It's Important. Rev-Trac. Retrieved April 18, 2023, from https://www.rev-trac.com/resources/articles/build-secure-software/
Rosencrance, L. (n.d.). What is a vulnerability assessment (vulnerability analysis)? Definition from SearchSecurity. TechTarget. Retrieved April 18, 2023, from https://www.techtarget.com/searchsecurity/definition/vulnerability-assessment-vulnerability-analysis
Ransome, J., & Misra, A. (2018).
Core Software Security: Security at the Source. CRC Press.

  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact