Get your essays here, 10,000 to choose from!

Limited Time Offer at MyTermPapers!!!

Information Security - SDLC

9 Pages 2276 Words October 2017

“We’re seeing more and more that cybersecurity can actually become a remarkable way to help a company innovate and move faster. In certain kinds of digital innovation, the security considerations, controls, and capabilities, alongside a frictionless means of authentication, are essential to the design and development of these new products and services.” [ CITATION Dav17 l 1033 ]
One of the biggest issues in the world today is Information Security. Almost anything can be found on the internet, even step by step videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many downfalls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity theft and company information theft. This gives Information Technology professionals a lot to think about when they consider Information Technology. One of the biggest threats facing the IT industries today is non-malicious security violations that leave companies vulnerable to attack. The purpose of this paper is to review and explain the phases of the Security Systems Development Life Cycle (SecSDLC), discussing the differences between the SDLC layers and how incorporates to our case study.
Sequential Label and Supply (SLS) has had its own issues dealing with attacks to its information security structure. Fred Chin is SLS’s CEO, who is responsible for the firm’s overall operations and performance. He is the leader of the firm, serves as the main link between the board of directors and the firm’s various parts or levels, and is held solely responsible for the firm’s success or failure. One of the major duties of a CEO is to maintain and implement corporate policy, as established by the board. [ CITATION Bus17 l 1033 ]
Gladys Williams is the company’s Chief Information Officer (CIO), which is an executive-level position that oversees the organization’s computing technolog...

Page 1 of 9 Next >

Essays related to Information Security - SDLC

Loading...