• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/12)
      • C4.1 (9/26)
      • C6.1 (10/10)
      • C8.1 (10/24)
      • C9.1 (10/31)
      • C10.1 (11/7)
      • C11.1 (11/14)
    • Practical Assignments
      • PA1.1 (Due 9/12)
      • PA2.1 (Due 9/26)
      • PA4.1 (Due 10/3)
      • PA5 (Due 10/17)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/31)
      • PA9.1 (Due 11/7)
      • PA10.1 (Due 11/7)
      • PA11.1 ( Due 11/24)
      • PA12.1 (Due 11/28)
      • PA13 (Due 12/5)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/19)
      • WA3.1 (Due 9/26)
      • WA4.1 (Due 10/3)
      • WA6.1 (Due 10/17)
      • WA8.1 (Due 10/31)
      • WA9.1 (Due 11/7)
      • WA10.1 (Due 11/14)
      • WA12.1 (Due 11/28)
      • WA13.1 (Due 12/5)
  • Webex
  • Gradebook

ITACS 5209

Temple University

Week 4 Written Assignment

In this unit, we discussed the software development life cycle.  The SDLC has been around for a long time, and has evolved quite a bit.  There are new techniques, such as agile development, SCRUM, etc.  Research some of these newer techniques to get a better understanding of some of the emerging trends in development.

While the SDLC and many of the newer methodologies you researched are intended to be used in software development, they can be used in many areas of IT, including IT security.  How might these techniques be used in IT security, and how can these structured approaches help ensure a more secure infrastructure?  How can these various techniques be used?  Can you find any examples in your research of these techniques being used by IT security teams?

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in