Need Help With your assignment? Get expert academic writing assistance! We can write any paper on any subject within the tightest time.
Use the Capella library to read the following:
Bahl, S., & Wali, O. P. (2014). Perceived significance of information security governance to predict the information security service quality in software service industry. Information Management & Computer Security, 22(1), 2–23.
This paper examines the perceptions of Indian software services staff with respect to information security governance. It also address the impact of information security service quality on customers.
Ghanbari, H., Vartiainen, T., & Siponen, M. (2018). Omission of quality software development practices: A systematic literature review. ACM Computing Surveys(CSUR), 51(2), 38–62.
The authors discovered that few software engineering and information systems studies have investigated the omission of quality practices. This article includes their findings.
Hassan, M. U., Mubashir, M., Shabir, M. A., & Ullah, M. M. (2018). Software quality assurance techniques: A review. International Journal of Information, Business and Management, 10(4), 214–221.
Tripp, M. (2018, Jun 4). Apple puts focus on swatting bugs. The Wall Street Journal.
This article discusses Apple’s technical woes caused by repeated software flaws in the iPhone and the complexities that are introduced with each successive code release.
Using the readings or additional literature, research the importance of designing software with quality and security in mind. How can companies develop products that meet the technical challenges of software development and the security challenges from attackers and others who want to exploit software vulnerabilities?
Read and respond to at least two other learners, providing comments and questions that encourage critical thinking and insight. Your response should extend the discussion and stimulate other learners to clarify, strengthen, and extend their dialogue.
This activity will help you achieve the following learning components:
Research benefits of system and application security.
Identify appropriate quantitative or qualitative case studies.
Study organizations, the security threats they face, best practices for security, and security controls.
Identify best practices in system and application security.
Address knowledge gap made evident from peer-reviewed research.