35 hours 10 minutes
greetings and welcome back to cyber is Conti a certified Van Security Practitioners Certification preparation course
We continue Our discussion of marginal in six was his title security development.
These are objectives which encompasses this particular module. We continue on by folks on our attention That point understand requirement for software development.
This is Section two, which is again a continuation.
Let's begin by taking a look at a pre assessment question, and the question is as follows Doing a blank phase the product team needs a sure they can deliver the requirements Is a analysis
Be design, See development or D implementation?
Your quick response should have been analysis face.
Let's not try and teach your discussion of this S T. L C. Which stands for your software development life cycle.
What does it mean?
Basically stands for supper development Life cycle All system have a life cycle or series of stages. They naturally undergo
the number named The State's varies, but the primary stages our conception, development, maturity and decline.
Assistant Ever life started, therefore, refers to development stage of the system life cycle.
While we saw interesting development, life cycle
one of my conception, maturity and decline
one of the reason we're very interested in this particular mark because it's a sister's internal prices of Bevin very developing various software's now one thing that I may want to make clear here in the past, when someone developed really that was not that much attention paid to security. Security, for the most part, was an afterthought.
Nowadays, securities that integrated in all aspects of this system development life cycle
now a republic. It's a different main for the stages of Sister Vivian Life cycle. You the stages are planning just up the conception analysis, design, implementation, yeah, maintenance. Also starting maturity.
In this presentation, we're gonna highlight six distinct phases. First of all, we have project difficult selection, project initiation and planning, analysis, design, implementation. Then we have maintenance.
So let's not turn on teach war project identifications, election there. Two main activities. We have the identification of need
privatization and translation off the need into what we call a development schedule. But if they're going to do go to help your own is to determine whether or not resources should be dedicated to a project
within the project. Initiation planning. The two activists formal preliminary investigation of problem at hand.
Presentation. Reason why this system should or should not be developed by the organization.
Within the analysis is the study of the current procedures and information system. You look at determining requirements in terms of this study, the current system. You structure the requirements and eliminate with Dunder see because again we won't have redundancy occur within that process. Will degenerate alternative again designs alternate designs
alternatives and recommend the best alternative in that process.
Doing design. We look at a logical design. We concentrate on the business aspect of the system.
We're looking at physical desire which looks at the technical specifications
within F implementation. Part of it. We look at the hardware to software installation programming wouldn't make sure we institute some form of user trading or recommend that be the case and also documentation
doing the maintenance
phase of these system vermin lifecycle. This system changed to reflect the changing condition. Ah, lot of time the system may become obsolete. Now Goodwin and learn the stage of the system better life cycles to create the liberal output off each stage in that particular process.
In terms of alternative approaches to this process, we can do what we call photo typing.
Other words. We build a scared down working version of this system.
Obviously, there's gonna be some advantages. The users are involved in the design it capture of promise in concrete form. We could also implore. We call rapid application development. You lies in game photo typing tuned in late
producing systems out until after the user requirements are clear.
So what goes into the application test?
Happy and secure. It goes where, beyond simply running this skin to for critical or high value application or those that processes the data Thorough tests and may actually include a combination of various Memphis listed here.
Doing this presentation, we discussed a system developing life cycle. We learned again that basically also have a life cycle or Siri's of stages that they naturally undergo.
We learned it in number and names of stages varies, but the primary stages our conception, development, maturity and decline. We also learned, lastly, that the city of em lifecycle therefore refers to a development stage of the system of element life cycle.
In our upcoming presentation or continuation of section two, we'll continue our discussion of understand requirements for software development.
Look forward to seeing you in a very next video
CompTIA Advanced Security Practitioner (CASP+)
This practice exam helps prepare for the CompTIA Advanced Security Practitioner (CASP+) certification exam. The ...
The CompTIA CASP+ Practice-Lab will provide you with the necessary platform to gain hands-on skills ...