Secure Web Application

OverviewYour team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, “I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday.”The project specs require a multi-page design. The app will need to provide an interface to your company’s supply database for reading and entering data remotely as well the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open source software library modules.Fully discuss, in 3–5 pages, the process that your team would follow to create and deliver that Web application.Provide at least six steps in the SDLC during which security strengthening behaviors will be applied.Explain the specific security relevant actions taken during each step to include the people involved, the considerations taken and security assurance methods used.Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Go to Basic Search: Strayer University Online Library to locate and use at least four quality sources in this assignment.This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:Propose a strategy for securing the operation of a Web application.34517915 hours ago
Unacceptable(Below 70%) Needs Improvement(70-79%) Competent(80-89%) Exemplary(90-100%)Provide six steps in the SDLC during which security strengthening behaviors will be applied.Points:0 (0.00%)Provided only 0–1 steps in the SDLC during which security strengthening behaviors will be applied.Points:22.5 (15.00%)Provided 2–3 steps in the SDLC during which security strengthening behaviors will be applied.Points:25.5 (17.00%)Provided 4–5 steps in the SDLC during which security strengthening behaviors will be applied.Points:30 (20.00%)Provided six steps in the SDLC during which security strengthening behaviors will be applied.Explain the specific security relevant actions taken during each step to include the people involved, the considerations taken, and security assurance methods used.Points:0 (0.00%)Did not explain the specific security relevant actions taken during each step to include the people involved, the considerations taken, and security assurance methods used.Points:22.5 (15.00%)Stated the specific security relevant actions taken during each step, but did not include the people involved, the considerations taken, and security assurance methods used.Points:25.5 (17.00%)Stated but did not explain the specific security relevant actions taken during each step to include the people involved, the considerations taken, and security assurance methods used.Points:30 (20.00%)Explained the specific security relevant actions taken during each step to include the people involved, the considerations taken, and security assurance methods used.Explain three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.Points:0 (0.00%)Did not explain at least three different security testing methods and did not indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Did not justify when you would use each method.Points:22.5 (15.00%)Identified three different security testing methods and indicated which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Did not clearly justify when you would use each method.Points:25.5 (17.00%)Identified but did not clearly explain three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Did not clearly justify when you would use each method.Points:30 (20.00%)Explained three different security testing methods and indicated which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justified when you would use each method.Explain six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Points:0 (0.00%)Did not explain six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Points:22.5 (15.00%)Explained fewer than three different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Points:25.5 (17.00%)Explained at least three different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Points:30 (20.00%)Explained six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.Provide four peer-reviewed, academic references.Points:0 (0.00%)No references provided.Points:5.625 (3.75%)Does not meet the required number of references; some or all references are not peer-reviewed, academic references.Points:6.375 (4.25%)Meets the required number of references; some or all references are not peer-reviewed, academic references.Points:7.5 (5.00%)Meets the required number of references; all references are peer-reviewed, academic references.Cite sources with complete functioning Web links. Test the links to ensure they work before submitting.Points:0 (0.00%)Did not cite sources with complete functioning Web links.Points:11.25 (7.50%)Cited sources, but did not include functioning links.Points:12.75 (8.50%)Cited sources with complete Web links, but some of the links were not functional.Points:15 (10.00%)Cited sources with complete functioning Web links. Tested the links to ensure they work before submitting.Clarity, writing mechanics, and formatting requirements.Points:0 (0.00%)Writing has spelling, punctuation, and grammatical errors, fragments, comma splices and run-ons that distract from the message. More than 6 errors present.Points:5.625 (3.75%)Writing has spelling, punctuation, and grammatical errors that are distracting in some places. 5–6 errors present.Points:6.375 (4.25%)Writing has spelling, punctuation, and grammatical errors that are distracting in a few places; few fragments, comma splices, and run-ons. 3–4 errors present.Points:7.5 (5.00%)Writing has very few spelling, punctuation, and grammatical errors. 0–2 errors.