• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2021 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

Instructor

Week 1 Reading Discussion

January 25, 2021 11 Comments

During this first week’s reading assignment, I learned there are many different methods for developing a software development lifecycle (SDLC). For example, for most SDLC’s, the basic response steps include planning, analysis, design, implementation and maintenance. However some organizations, such as Microsoft, will add additional steps to the process or define a step differently.

MSFT’s Software Development Lifecycle includes training, requirements, design, implementation, verification, release and response. Each member of the development team must receive training in security basics and trends in security. This is to help make the team start their SDL with security in mind. With this additional step, it can help prevent the company from committing security errors because they weren’t looking at their project with security as a focus. Even with this extra step, the process outlined by MSFT can be used  in many frameworks. They can use Agile, CASE, DevOps or DevSecOps when trying to implement their process. 

I feel adding a step such as training is a must for most organizations. Applications must be developed with security as the top priority. If the SDLC process doesn’t have the correct security measures in place, the organization could end up being the next SolarWinds. 

SDLC IN THE NEWS 
SDLC has been in the news a lot lately due to the SolarWinds supply chain attack which occurred last month. During the SolarWinds attack, the intruders were able to leverage the SDLC of SolarWinds and move laterally within the organization. The attackers made their code look authentic and were able to inject it into the ORION platform. The SDLC process from SolarWinds didn’t find the intruders code in the DLL file. This allowed the ORION platform to be updated with this file included. Customers would visit the SolarWinds site and download the new file. The admins then updated their ORION software. The new software would download the DLL, allowing intruders to potentially invade other organizations. All of the traffic to and from the ORION application looked authentic. The attackers did a very good job of making everything look legitimate. Because of this major issue, the SDLC process is under heavy scrutiny within most large application development companies. 

https://www.guide-rails.io/resources/the-solarwinds-breach-and-securing-the-sdlc
https://securityboulevard.com/2020/12/solarwinds-sunbrust-backdoor-investigation-using-shiftlefts-code-property-graph/

For more information about the SolarWinds attack, read this blog by FireEye: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html

Week 1 Presentation

January 21, 2021 Leave a Comment

5203-Spring-2021-01

Welcome to course 5203

August 24, 2018 Leave a Comment

User experience photoHello and welcome to 5203 course. I look forward to the first class. Please purchase the required course materials as soon as you can.

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5

Primary Sidebar

RECENT ANNOUNCEMENTS

Week 14 Implementation Plan Risks – Prince Patel

What Are the Risks of an Implementation Plan? As is the case with any … [More...] about Week 14 Implementation Plan Risks – Prince Patel

Week 13 Smoke Testing- Prince Patel

Smoke Testing Smoke testing is performed on the ‘new’ build given by … [More...] about Week 13 Smoke Testing- Prince Patel

Week 12 (FaaS) Function as a Service! – Prince Patel

You all must have heard IaaS, PaaS & SaaS. But let me introduce you to … [More...] about Week 12 (FaaS) Function as a Service! – Prince Patel

Week 10 What is Guerrilla Usability Testing? – Prince Patel

Guerrilla testing In guerrilla testing, test subjects are chosen … [More...] about Week 10 What is Guerrilla Usability Testing? – Prince Patel

Week 9 Dev-ops Software Development Methodology – Prince Patel

DevOps development methodology DevOps is not just a development … [More...] about Week 9 Dev-ops Software Development Methodology – Prince Patel

Week 8 Database Design Steps – Prince Patel

How to Design Database: Steps of Designing Database Database designing … [More...] about Week 8 Database Design Steps – Prince Patel

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University