Analyze Database and Software Development Methods and Security Models

Week 4 Assignment: Analyze Database and Software Development Methods and Security Models

NCU-FSB is in the process of implementing an ERP solution for administrative process integration. The solution to be implemented will cover all operations (loans, credit cards, mortgages, IRAs, investments, and financial counseling services) with administrative operations (human resources, finances, plant management, procurements, and asset management, among others). To ensure that the chosen solution meets all technical and security requirements, the CEO asked the CIO and you as the CISO with analyzing industry solutions and recommending the criteria the solution (commercial off-the-shelf [COTS] or in-house development) must meet.

The deliverable for this assignment will be a testing checklist of all criteria that must be assessed and can be supported by a diagram or flowchart. These criteria will become the standards for data and application management for all applications to be updated or developed. Therefore, this will be part of the risk-management plan that you will submit as your Signature Assignment. You will design a comprehensive checklist of all criteria to be validated during design, development, and testing.

After you complete your checklist of database controls and applications, and development and implementation criteria, you will write your recommendations as to the best practices to follow and observe to guarantee compliance with these proposed criteria. As part of your analysis and recommendations, present a comparison of the waterfall model, spiral model, rapid application development, reuse model, and extreme programming as strategies for secure software and application solutions supports the security posture of an organization.

Length: 2-4 pages not including titles and reference pages.

References: Include a minimum of 5 scholarly resources.

Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Upload your document and click the Submit to Dropbox button.

find the cost of your paper

Complete independent research and review two (2) to three (3) online end-user license agreements.

Complete independent research and review two (2) to three (3) online end-user license agreements. Compare and contrast each EULA with each other. In your response, please consider the following: ·….

Write a SQL query that identifies the number of prescriptions grouped by drug name.

ALY6030 Final Project Assignment – Pharmacy Claims Due End of Week 6 Background: The excel file “ALY 6030 Final Project Data Set.xlsx” contains sample pharmacy claims for made-up members of….

Create a JavaFX program to allow a user to query the Northwind database.

Create a JavaFX program to allow a user to query the Northwind database. You should be able to perform the following functionality using the program:   Print order total (not….