Module 2

Secure Software Development (Computer Science)

Unit 1

Introduction to Secure Software Development

Learning Outcomes

  • Identify relevant academic literature which discusses the ways in which secure software may be developed using an agile process.
  • Decompose an activity into a set of tasks which can be represented using a flow chart from the UML portfolio of modelling techniques.
  • Describe the importance of creating a culture of risk awareness in an organisation, in addition to the creation of secure software.

e-Portfolio Component: Collaborative Discussion 1: UML flowchart

  • A UML sequence diagram demonstrating SQL injection was created. A short introduction of SQL injection was provided. Link to the discussion forum's post: here

e-Portfolio Component: Share your e-portfolio

  • e-portfolio link was shared with peers. Link to the discussion forum's post: here

Reflection

  • As an introductory unit, Unit 1 posed significant challenges. The diverse activities, including collaborative discussions, e-portfolio creation and team formation demanded considerable effort. Among these, I found the collaborative discussions particularly engaging. Through these discussions, I gained valuable insights into the coding weaknesses identified by OWASP.

Phone

-

Address

Mumbai, India