Module 2
Secure Software Development (Computer Science)
Unit 1
Introduction to Secure Software Development
Learning Outcomes
- Identify relevant academic literature which discusses the ways in which secure software may be developed using an agile process.
- Decompose an activity into a set of tasks which can be represented using a flow chart from the UML portfolio of modelling techniques.
- Describe the importance of creating a culture of risk awareness in an organisation, in addition to the creation of secure software.
e-Portfolio Component: Collaborative Discussion 1: UML flowchart
- A UML sequence diagram demonstrating SQL injection was created. A short introduction of SQL injection was provided. Link to the discussion forum's post: here
e-Portfolio Component: Share your e-portfolio
- e-portfolio link was shared with peers. Link to the discussion forum's post: here
Reflection
- As an introductory unit, Unit 1 posed significant challenges. The diverse activities, including collaborative discussions, e-portfolio creation and team formation demanded considerable effort. Among these, I found the collaborative discussions particularly engaging. Through these discussions, I gained valuable insights into the coding weaknesses identified by OWASP.