Analyze Database and Software Development Methods and Security Models

Analyze Database and Software Development Methods and Security Models

The Paper is to be written in Microsoft word.
NCU-FSB is in the process of implementing an ERP solution for administrative process integration. The solution to be implemented will cover all operations (loans, credit cards, mortgages, IRAs, investments, and financial counseling services) with administrative operations (human resources, finances, plant management, procurements, and asset management, among others). To ensure that the chosen solution meets all technical and security requirements, the CEO asked the CIO and you as the CISO with analyzing industry solutions and recommending the criteria the solution (commercial off-the-shelf [COTS] or in-house development) must meet.

The deliverable for this assignment will be a testing checklist of all criteria that must be assessed and can be supported by a diagram or flowchart. These criteria will become the standards for data and application management for all applications to be updated or developed. Therefore, this will be part of the risk-management plan that you will submit as your Signature Assignment. You will design a comprehensive checklist of all criteria to be validated during design, development, and testing.

After you complete your checklist of database controls and applications, and development and implementation criteria, you will write your recommendations as to the best practices to follow and observe to guarantee compliance with these proposed criteria. As part of your analysis and recommendations, present a comparison of the waterfall model, spiral model, rapid application development, reuse model, and extreme programming as strategies for secure software and application solutions that supports the security posture of an organization.

find the cost of your paper

Abortion

Abortion Discuss the technical aspects of your topic in general terms. Discuss the public policy debates relevant to the topic you choose. This section should cover arguments that favor and….

Comprehensive Community Assessment

Comprehensive Community Assessment 1.Identification of 2 Social Determinants of Health in your chosen community. 2. Identification of 2 health care disparities and the vulnerable populations affected in your chosen community…..

The Constitution makes it difficult for authoritarians to take power in the US

The Constitution makes it difficult for authoritarians to take power in the US In How Democracies Die, Levitsky and Ziblatt argue that the greatest threat to democratic governance in the….