Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Developer [ Insert your name here. ] 1 . Interpreting Client Needs Determine your client s needs and potential threats and attacks associated with the

Developer
[Insert your name here.]
1. Interpreting Client Needs
Determine your clients needs and potential threats and attacks associated with the companys application and software security requirements. Consider the following questions regarding how companies protect against external threats based on the scenario information:
What is the value of secure communications to the company?
Are there any international transactions that the company produces?
Are there governmental restrictions on secure communications to consider?
What external threats might be present now and in the immediate future?
What modernization requirements must be considered, such as the role of open-source libraries and evolving web application technologies?
[Include your findings here.]
2. Areas of Security
Refer to the vulnerability assessment process flow diagram. Identify which areas of security apply to Artemis Financials software application. Justify your reasoning for why each area is relevant to the software application.
[Include your findings here.]
3. Manual Review
Continue working through the vulnerability assessment process flow diagram. Identify all vulnerabilities in the code base by manually inspecting the code.
[Include your 710 findings here.]
4. Static Testing
Run a dependency check on Artemis Financials software application to identify all security vulnerabilities in the code. Record the output from the dependency-check report. Include the following items:
The names or vulnerability codes of the known vulnerabilities
A brief description and recommended solutions provided by the dependency-check report
Any attribution that documents how this vulnerability has been identified or documented previously
[Include your findings here.]
5. Mitigation Plan
Interpret the results from the manual review and static testing report. Then identify the steps to mitigate the identified security vulnerabilities for Artemis Financials software application.
[Include your findings here.]
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Learn To Program Databases With Visual Basic 6

Authors: John Smiley

1st Edition

1902745035, 978-1902745039

More Books

Students also viewed these Databases questions

Question

5. Understand how cultural values influence conflict behavior.

Answered: 1 week ago

Question

using signal flow graph

Answered: 1 week ago