d7.docx

Secure software development is one of the most critical factors to ensure a trustworthy computing environment. Unfortunately, most software products come with vulnerabilities, even developed by major companies like Microsoft and Apple. Watch the following video:

· A picture containing black, screenshot  Description automatically generatedBy Dan Cornell

Do you think it is possible to develop flawless software? What are OWASP Application Security Verification Standard (ASVS) and OWASP Software Assurance Maturity Model (SAMM) 's roles and effectiveness in developing vulnerability-free software?

Action Items

1. Post a 3- to 4-paragraph (375 to 500 words) discussion and reflection on the topics.

· Consider this to be a mini “reflection paper” per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read. Note any “ah-ha!” moments.

· Find a current news article or journal article that highlights the topics for the week. Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module. Suggested resource to use for this assignment:  NewsbankLinks to an external site.

· Connect the topics from the above resources back into prior coursework you have taken at Franklin or other institutions. Talk about where you first encountered the topics or concepts and whether or not this exposure to them enhanced or solidified your understanding.

image1.png

Our customer support team is here to answer your questions. Ask us anything!