Featured Post
The Essence of a Love Poem Essay -- Papers
The Essence of a Love Poem What is an affection sonnet? Many accept that an adoration sonnet should be sweet and sentimental. That is the...
Friday, October 18, 2019
Security Practitioners Essay Example | Topics and Well Written Essays - 750 words
Security Practitioners - Essay Example The whole procedure of software/application development is usually guided by a systematic software/application developing method that includes the following phases. The first step is evaluating the weaknesses of the existing software by interviewing the users; the second phase is where the new system is defined which takes care of the deficiencies in the old model. The third phase involves designing of the proposed system, in this phase, strategies are put in place regarding the physical development, hardware, operating system, programming, communication and security matters, the fourth phase is the development of the new software, in this phase, the users are also trained on its use. In addition its performance capabilities are also tested, if need be, adjustments are made at this stage. The next phase is putting the software into use where it can be phased in by gradually removing the old system or removing the old system at once and replacing it with the new system. ... This forms the basis of handling future projects whereby the background knowledge endowed to the students (what they learnt at school) is fundamental in enhancing their skills. A major challenge through this form of learning is that the security part, which is very critical in any software, is usually left to the professional to handle it therefore denying software development learners a chance to have an intensive hands on experience in software security. Software developer training and learning involves certification in SAS certified base programmer and SAS certified advanced programmer which are very important especially to programmers who deal with business applications and software. The other relevant certifications include Siebel, Oracle and Microsoft (McGraw, 82). Due to the rise in cybercrimes, it is vital for security training to be undertaken to ensure that all the information is safeguarded. To enhance security, IP filtering is necessary to ensure that specific information is only available at restricted areas; the students should b taught on the same though practical lesson by working alongside professionals while undertaking such assignments. Software developers learning has not been much concerned about the security of the applications that they make since their training involves creating applications with little attention to security issues of the software. This can be explained by the fact that the curriculum that is used in formal training institutions was made when there were few security threats therefore it did not put into account training in security. However, with increased security concerns, there has been a change in the tread with most software
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.