Order Software Weaknesses Assignment

Order Software Weaknesses Assignment
You hear voices coming from the chief technology officer’s office as
you approach to hand in your weekly status report.
As you walk in, he looks up and says, “Perfect timing! I have a new
project for you.”
John introduces Brenda, the director over in Accounting Systems.
“Brenda, please explain why you’re here and what you need from us.”
Brenda smiles. “Sure. As I was just telling John, accounting needs a
more efficient way to handle our month-end closing procedures.
“Currently, this process is cumbersome with many tasks that could be
automated. Also, every month during this procedure, we process a
high volume of sensitive data that could be at risk while we implement
any type of change.
“In a few weeks, John and I must make a recommendation to the CEO
whether to purchase new software or develop an original application to
improve the efficiency of month-end processing. We need to present a
recommendation that will consider the needs of accounting while
keeping the data secure.”
John turns to you. “I would like you to look into solutions and provide
me with a recommendation prior to our meeting with the CEO. There
are several factors that I would like you to think about.
“First, consider the importance of supply chains. I would also like some
slides on supply chain risk management concepts that I can include in
my presentation. Next, conduct your due diligence on software
development. The third factor to consider is software assurance,
whether we develop or procure. And finally, should we be considering
open source options?
Order Software Weaknesses Assignment
Whatever option we choose, we’ll need to support the maintenance of
it, and so you should also develop a maintenance plan that provides all
of the functionality needed by the accounting department, with minimal
disruption in their operations, and of course, maximum security.”
Brenda says, “Automating the month-end process will be a huge
benefit to the accounting department.”
John concludes, “I would like to see your final recommendations in
three weeks in order for us to have time to prepare for our conversation
with the CEO.”
There are 12 steps in this project. Begin by reviewing the project
scenario and then proceed to Step 1.
Your work will be evaluated using the competencies listed below.
 6.1: Analyze secure software development methodologies and
describe the cybersecurity issues that each methodology
 6.4: Systems Life Cycle: Explain systems life cycle management
concepts used to plan, develop, implement, operate, and
maintain information systems.
 9.4: Software Security Assurance: Demonstrate secure principles,
methods, and tools used in the software development life cycle.
 9.5: Software Security Assurance: Describe the cybersecurity
implications related to procurement and supply chain risk
Step 1: Determine Relevant Supply Chain
Risk Management (SCRM) Practices and
You will begin your project with an investigation of supply chain risk
management (SCRM). SCRM is the implementation of strategies to
manage risks associated with the selection, installation,
implementation and use of products with the goal of reducing
vulnerabilities and assuring secure operations. It is important to
understand SCRM in order to make informed decisions regarding the
selection of products.
Review supply chain risk management concepts and theories.
As you read about SCRM, document the following:
 SCRM best practices—Identify best practices and successful
implementation. Describe supply chain risk management
practices and the
 SCRM threats—List and describe supply-chain cybersecurity
threats and the technologies and policies that can be used to
mitigate the threats.
 SCRM challenges—Determine the SCRM challenges in your
organization given its business and culture and the concerns that
John cited during your meeting. Evaluate the various approaches
to developing secure code in a cost-effective manner in light of
your organization’s software assurance needs and expectations,
software assurance objectives, and software assurance coding
and development plan. You will want to optimize the
effectiveness of your software procurement by addressing early
your organization’s information security requirements and risk
management in the supply chain germane to your workplace.
You will use this information throughout the project and to help you
create the presentation slide deck.
Step 2: Create Presentation Slide Deck
Using the information that you obtained on supply chain risk
management (SCRM), develop a slide deck with a minimum of six
slides. John will include these slides in his final presentation to educate
his audience on SCRM. These slides should identify the key concepts,
considerations, and applicability of SCRM for your organization.
Submission for SCRM Presentation Slide Deck
Previous submissions

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY