Overview In this journal assignment, you will make two submissions to your portfolio. Remember that you will submit portfolio artifacts in different courses throughout the Computer Science program....

1 answer below »

Overview


In this journal assignment, you will make two submissions to your portfolio. Remember that you will submit portfolio artifacts in different courses throughout the Computer Science program. This portfolio is an opportunity for you to catalog your learning and showcase your best work to future employers. You will also reflect on the work that you have done in these projects. Reflecting will help add context to refresh your memory when you review your portfolio in the future.



Prompt


For this course, you will choose one artifact to add to your GitHub repository for your portfolio.
Submit either (1) the completed Artemis Financial Vulnerability Assessment Report, or (2) the completed Artemis Financial Practices for Secure Software Report
that you created for your client, Artemis Financial, in Projects One and Two. These completed documents demonstrate your ability to complete a vulnerability assessment and code securely.


Once you have submitted one of the artifacts listed above,
write a report to answer the questions below and include
in your repository and include your answers to each of the questions below. You could include the questions and write a few sentences in response to each one, or you could write a paragraph or two weaving together all of your answers.



  • Briefly summarize your client, Artemis Financial, and their software requirements. Who was the client? What issue did they want you to address?

  • What did you do particularly well in identifying their software security vulnerabilities? Why is it important to code securely? What value does software security add to a company’s overall wellbeing?

  • What about the process of working through the vulnerability assessment did you find challenging or helpful?

  • How did you approach the need to increase layers of security? What techniques or strategies would you use in the future to assess vulnerabilities and determine mitigation techniques?

  • How did you ensure the code and software application were functional and secure? After refactoring code, how did you check to see whether you introduced new vulnerabilities?

  • What resources, tools, or coding practices did you employ that you might find helpful in future assignments or tasks?

  • Employers sometimes ask for examples of work that you have successfully completed to demonstrate your skills, knowledge, and experience. What from this particular assignment might you want to showcase to a future employer?


Guidelines for Submission

You should also include the
word document file
with your written responses to the questions above
Answered 2 days AfterAug 16, 2022

Answer To: Overview In this journal assignment, you will make two submissions to your portfolio. Remember that...

Amar Kumar answered on Aug 19 2022
72 Votes
An organization called Artemis Financial makes monetary designs for individuals that cover everything from protection and speculations to retirement and investment funds. Considering that the business handles delicate client data, for example, SSNs and charge data, the meaning of secure correspondences is exceptionally pivotal. Considering the way that there were no signs that Artemis Financial was arranged exclusively in the US, it is sensible to reason that this business would need to manage cross-line exchanges. Ensuring that proprietary advantage material isn't uncovered would be the main critical legislative requirement the partnership would have to consider with respect to encoded interchanges. The vitally outer danger focuses on the data of any client, such a great deal the information should be intensely scrambled from anybody outside the association because of the outrageous need to protect all types of data. A contemporary need that Artemis Financial ought to consider is staying aware of bug fixes and debilitating security strings.
Areas of Security-
· Input Validation: To check the data's proprietor, Artemis Financial necessities input affirmation. Clients would be safeguarded by this. As strings, the info legitimacy would be recorded.
· Code Excellence, You can assume command over strategy access in view of the client inside code quality. For example, a client would simply have the option to get to their own data and not that of some other clients or even that of the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here