Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

CMIT 425 - WEEK 7 ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words).

1. Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. This complexity also makes implementing security more challenging. Given this environment, what suggestions for secure software development best practices would you suggest to improve software security?

2. In addition to application development, databases are another area that needs to have a focus on security within their design. Describe the database concepts of View-based access control, Polyinstantiation, Data warehousing and data mining, and Online Transaction Processing (OLTP)?

3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question