Discussion Question
Testing Access Control
o Discuss the purpose of the security development life cycle and how it is used for testing security systems. Using the Internet, find two to three tools that could be used to conduct a vulnerability assessment. Include the web URL and share with your classmates. Are paid tools more effective than open-source tools? How does someone determine the best tool to use for an assessment? Justify your answers.
o Additional post options: Should a company conduct their own pen test or should they pay to have an outside company conduct the tests? Justify your answer.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.