preview

Key Differences Between Sedc And Sedlc

Better Essays

Abstract
In today’s complex IT system because of the wide abundance of threats and deliberate attempts to attack networks and IT assets, it is crucial to have a stream-lined process which attempts to incorporate security as an integral part of the development process as opposed to including security measures after the development cycle has finished. System Development Lifecycle (SDLC) is a hypothetical method created for the design and step-by-step implementation of general information system in business organizations using six different phases. Security System development lifecycle (SecSDLC) uses the same six phases to implement the security project except that its intent and scope is specific to the particular threats identified and designing …show more content…

In SDLC, information security is not considered from the inception of the project from the investigation phase, in contrast, SecSDLC implements information security in each stage of the phases. Implementation of security as an integral part of the development process helps to avoid vulnerabilities in the system and integration of security at each stage of the phases will be a seamless operation and the amount of spending and time requirement will be significantly minimized. Another key difference which makes the SecSDLC more attractive over SDLC is the fact that SecSDLC attempts to analyze existing security policies and find loopholes in the system, examine legal issues and perform risk assessment of the current threat to the IT infrastructure at hand and based on the assessment results buildup of security blueprint and incident response planning will be performed (Whitman & Mathord, 2012, p.26-28). This stream-lined process makes the SecSDLC more suitable for current IT Systems where threats and vulnerabilities are limitless. Systems designed with no inherent security blueprint in place such as the traditional SDLCs fail to survive in the current and future IT systems. In the current and future IT implementation, prevention is given more emphasis than finding a cure once exposed to threats and

Get Access