I’m working on a cyber security project and need support to help me understand better.TRANSCRIPTCyber management and policy professionals need to be able to identify software security vulnerabilities and communicate those vulnerabilities to nontechnical policy makers. Whether an organization purchases commercially available software or develops original applications, understanding the vulnerabilities is especially important.
This is the third of four sequential projects. In this project, you will evaluate relevant vulnerabilities, determine potential costs associated with these vulnerabilities, and recommend the best solution for an organization. You will also develop and present a software maintenance plan, taking into consideration the supply chain risk management (SCRM) framework. Finally, you will present the recommended solution to a nontechnical audience.There are 12 steps in this project.
Begin by reviewing the project scenario and then proceed to Step
1.CompetenciesYour work will be evaluated using the competencies listed below.
6.1: Analyze secure software development methodologies and describe the cybersecurity issues that each methodology addresses.
6.4: Systems Life Cycle: Explain systems life cycle management concepts used to plan, develop, implement, operate, and maintain information systems.
9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.
9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.
Requirements: 7 pages