1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
2 years ago
7

A development team begins work on a new software application and decides to involve the client’s it experts to ensure that secur

ity concerns are addressed on an ongoing basis throughout the project’s lifecycle. Which security capability is responsible for securing the software?.
Computers and Technology
1 answer:
Katarina [22]2 years ago
7 0

Application Security is responsible for securing the software.

Application security refers to the process of creating, integrating, and testing security measures inside of applications to close security vulnerabilities to threats including unauthorised access and modification.

Application security is a technique for making apps more secure by identifying, addressing, and enhancing the security of apps.

While much of this occurs during the development phase, it also includes tools and approaches to protect apps after they are launched.

A method for identifying a device's vulnerabilities and confirming that its sources and data are protected from potential intruders is security testing.

It ensures that the application and software are safe from any dangers or hazards that could cause a loss.

Learn more about application security:

brainly.com/question/28020583

#SPJ4

The complete question is ''A Development team begins work on a new software application and decides to

involve the client's IT experts to ensure that security concerns are addressed on

an ongoing basis throughout the project's lifecycle.

Which security capability is responsible for securing the software?

O Application Security

O Identity and Access Management

O Security Operations

O Risk Management

O I don't know this yet.

You might be interested in
When you first open a ms word document, what is the name of the document located on the first line of the document?
VladimirAG [237]
When you first open a Microsoft Word document, the first line of text in the document is pre-filled in as the document's file name. You can also change the filename of the document, by typing in a new one. But if you don't type a new one, then the filename will remain as the first line of your document.
4 0
4 years ago
The advancement of technology in our daily lives has changed how we interact with the world.
matrenka [14]
I agree. i think there’s less communication, more anger, mental issues.
5 0
3 years ago
1. Software used to search a database using keywords or phrases entered by the user.
vladimir1956 [14]

Answer:

1 C

2 D

3 B

4 A

5 D

6 B (the question should state software that manages ...)

7 D

8 C

9 A

10 B

11 C

12 D

13 B

Explanation:

6 0
3 years ago
Python 4.5 code practice
Arada [10]

Answer:

add the question

Explanation:

3 0
3 years ago
Which of the following are considered transactions in an information system?
Marrrta [24]

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

5 0
3 years ago
Other questions:
  • Use a colon before a list and put one space after a colon. True False
    15·2 answers
  • A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N
    11·1 answer
  • The acronym LAH stands for
    14·2 answers
  • On the piano, the pitches/notes used on the bass clef are located on what part of the keyboard?
    9·2 answers
  • What advantage does digital storytelling have over oral storytelling traditions?
    6·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Can you please help look at the picture i will give you a. brainliest and 10 points​
    15·2 answers
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • What is not one of the top health concerns in the United States?physical activitymental healthtobacco useaccess to education
    8·1 answer
  • When you start a new, blank document, you usually end up changing the font to arial 11. 5 point. How can you make these settings
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!