Professional Documents
Culture Documents
Trustworthiness in SDLC
Student’s Name
Institution Affiliation
TECHNOLOGY 2
Trustworthiness in SDLC
Due to technological advancement, industries such as Microsoft and Cisco that are
working towards delivering trustworthiness within their lifestyle development processes vitally
minimize security risks, eliminate security vulnerabilities, and significantly reduce costs. The
cybersecurity and information privacy of these firms are protected against unauthorized access
when there is system trustworthy. When interconnected systems are verified and certified as
trustworthy, reliability, safety and security are major concerns that will be addressed.
Trustworthy systems are valuable in terms of productivity, user satisfaction, improved services,
The statement "while this is time-consuming, the benefits far out weights the time spent
suboptimal performance which are all critical and time-consuming. Detection of such attacks on
monitoring, control, and management systems (Microsoft, 2020). Detection of unsecured states
also requires designing of shut-down strategies. However, despite being time-consuming, the
benefits derived from verifying interconnected systems for trustworthiness outweigh its cost or
strengthens the security of systems and thus prevent possible vulnerabilities to system
functionality. A trusted system reduces vulnerabilities and related risks by ensuring there is
immediate remediation of threats. Once such threats are eliminated the benefits of the system
from confidentiality, integrity, and authentication of information which may be subject to leak or
TECHNOLOGY 3
unauthorized individuals who may render it vulnerable. Network design and configuration,
physical security, system maintenance, and procurement processes are some of the enhanced
activities achieved with trustworthy systems. Other companies that use the same means of
Reference
from https://www.microsoft.com/en-us/securityengineering/sdl