Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Developer [ Insert your name here. ] 1 . Interpreting Client Needs Determine your client s needs and potential threats and attacks associated with the
Developer
Insert your name here.
Interpreting Client Needs
Determine your clients needs and potential threats and attacks associated with the companys application and software security requirements. Consider the following questions regarding how companies protect against external threats based on the scenario information:
What is the value of secure communications to the company?
Are there any international transactions that the company produces?
Are there governmental restrictions on secure communications to consider?
What external threats might be present now and in the immediate future?
What modernization requirements must be considered, such as the role of opensource libraries and evolving web application technologies?
Include your findings here.
Areas of Security
Refer to the vulnerability assessment process flow diagram. Identify which areas of security apply to Artemis Financials software application. Justify your reasoning for why each area is relevant to the software application.
Include your findings here.
Manual Review
Continue working through the vulnerability assessment process flow diagram. Identify all vulnerabilities in the code base by manually inspecting the code.
Include your findings here.
Static Testing
Run a dependency check on Artemis Financials software application to identify all security vulnerabilities in the code. Record the output from the dependencycheck report. Include the following items:
The names or vulnerability codes of the known vulnerabilities
A brief description and recommended solutions provided by the dependencycheck report
Any attribution that documents how this vulnerability has been identified or documented previously
Include your findings here.
Mitigation Plan
Interpret the results from the manual review and static testing report. Then identify the steps to mitigate the identified security vulnerabilities for Artemis Financials software application.
Include your findings here.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started