Based on the facts presented in the case, how far had Fetcher-Allen progressed in these steps by June, 1998? (Explain your reasoning supported by specific evidence from the case study.)
Unit #8 – Question 2
How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999? (Explain your reasoning.)
Unit #8 – Question 3
At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.” What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?
Wrap Up
Wrap Up
All Questions
- What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
- What are secure coding practices and what risks are they intended to mitigate?
- How would you determine if an applications development project team was using secure coding practices?
Question 1
What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
Question 2
What are secure coding practices and what risks are they intended to mitigate?
Question 3
How would you determine if an applications development project team was using secure coding practices?