When designing a new application or software product that entails access control, security should be embedded throughout its development.
· Compare the software development life cycle to the security development life cycle and describe how each is used to enable testing and how they differ from each other.
· Search the Internet and find and describe at least two tools to assist with the software development and security life cycles and discuss the pros and cons of each tool.