Question: Developer [ Insert your name here. ] 1 . Interpreting Client Needs Determine your client s needs and potential threats and attacks associated with the

Developer
[Insert your name here.]
1. Interpreting Client Needs
Determine your clients needs and potential threats and attacks associated with the companys application and software security requirements. Consider the following questions regarding how companies protect against external threats based on the scenario information:
What is the value of secure communications to the company?
Are there any international transactions that the company produces?
Are there governmental restrictions on secure communications to consider?
What external threats might be present now and in the immediate future?
What modernization requirements must be considered, such as the role of open-source libraries and evolving web application technologies?
[Include your findings here.]
2. Areas of Security
Refer to the vulnerability assessment process flow diagram. Identify which areas of security apply to Artemis Financials software application. Justify your reasoning for why each area is relevant to the software application.
[Include your findings here.]
3. Manual Review
Continue working through the vulnerability assessment process flow diagram. Identify all vulnerabilities in the code base by manually inspecting the code.
[Include your 710 findings here.]
4. Static Testing
Run a dependency check on Artemis Financials software application to identify all security vulnerabilities in the code. Record the output from the dependency-check report. Include the following items:
The names or vulnerability codes of the known vulnerabilities
A brief description and recommended solutions provided by the dependency-check report
Any attribution that documents how this vulnerability has been identified or documented previously
[Include your findings here.]
5. Mitigation Plan
Interpret the results from the manual review and static testing report. Then identify the steps to mitigate the identified security vulnerabilities for Artemis Financials software application.
[Include your findings here.]
 Developer [Insert your name here.] 1. Interpreting Client Needs Determine your

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!