Assignment 2: best coding practices | CIS542 | Strayer University


You  have been promoted to manager for the e-Commerce site for the company  you made up in Assignment 1. You are concerned about the recent SQL  attack. Your team reacted to the situation by notifying you immediately.  You and your team were successful in containing and correcting the  issues that allowed the Website and database to be compromised by a SQL  injection attack. 

Knowing  that many of the issues can be created by human error, you have decided  to evaluate the processes your team uses when they code. As their  leader, it is your responsibility to be current on all of the best  secure coding practices. Your job is to create guidelines for best  coding practices, which you will present to your team.

For Part I,  you’re going to write a memo to the CEO and CSO documenting your  guidelines based on your findings when you evaluated your company’s  processes. 

  1. Justify why it is less expensive to build secure software than to correct security issues after a breach. 
  2. Outline  the objectives and purpose of your company’s “best secure coding  practices” and explain how it will influence your division.   
  3. Evaluate  which method of the secure software development life cycle will best  serve your team and explain how you plan on implementing your thoughts  into your existing processes. 
  4. Identify  three resources that can be used as “reference material” and act as a  beginner’s guideline for new employees. Outline the importance of each  resource and how each resource can assist new coders.
  5. Use at least four quality references in this assignment. Note:  Wikipedia and similar websites do not qualify as quality references. Be  sure to CITE your sources with complete functioning Web links. Test the  links to ensure they work before submitting your paper
  6. Format your assignment according to the following formatting requirements: 
    • Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page is not included in the required page length.
    • Include a reference page. Citations and references must follow professional business language format.

Part II: PowerPoint Presentation

Create a PowerPoint presentation for your team in which you:

  1. Outline  the all of the major aspects of the Best Practice Coding guideline,  including objectives, purpose, resources, and methodology. Note:  Please include your fictional company’s name on each slide of your  presentation. Remember, you’re planning on using this experience when  you take what you’ve learned out into the real world.

The specific course learning outcomes associated with this assignment are:

  1. Analyze common Website attacks, weaknesses, and security best practices.
  2. Describe the attributes and qualities of secure coding practices and the tools used to conduct security verification.
  3. Analyze the role and importance of quality assurance testing for Web applications using a security lifecycle.
  4. Use technology and information resources to research issues in securing Web-based applications.
  5. Write  clearly and concisely about Web application security topics using  proper writing mechanics and technical style conventions. 
Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.

Read more

Free-revision policy

The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.

Read more

Privacy policy

The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.

Read more

Fair-cooperation guarantee

By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages