Discussion Post I: Software Development Security/Secure Software Development
After reading this week's materials, please respond to one or more of the following questions.
• Compare three of the following development methodologies: Break and Fix, Waterfall, V-Model, Prototyping, Incremental, Spiral, Rapid Application Development, and Agile.
• What is the Capability Maturity Model Integration (CMMI) and what are the five maturity levels within the CMMI model?
• Describe the five basic software programming language generations? Define the following programming terms: assembler, compiler, interpreter, and garbage collector.
• What is object oriented programming and what benefits does it provide. Define encapsulation, abstraction and polymorphism.
Discussion Post II: Software Development Security/Mobile Code, Database Security and Malware
After reading this week's materials, please respond to one or more of the following questions.
• Explain the following terms: boot sector virus, meme virus, stealth virus, multipartite, macro virus, script virus, and tunneling virus
• Explain the difference between a virus and a worm. Describe what a Trojan Horse, Root Kit, Adware/Spyware, Botnet and a Logic Bomb are.
• Define the following key database terms: record, file, database, DBMS, Tuple, Attribute, Primary Key, View, Foreign Key, Cell, Schema, and Data Dictionary.
• What are some security concerns when using mobile code?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.