You are on page 1of 4

Running head: TECHNOLOGY 1

Trustworthiness in SDLC

Student’s Name

Institution Affiliation
TECHNOLOGY 2

Trustworthiness in SDLC

Due to technological advancement, industries such as Microsoft and Cisco that are

working towards delivering trustworthiness within their lifestyle development processes vitally

minimize security risks, eliminate security vulnerabilities, and significantly reduce costs. The

cybersecurity and information privacy of these firms are protected against unauthorized access

when there is system trustworthy. When interconnected systems are verified and certified as

trustworthy, reliability, safety and security are major concerns that will be addressed.

Trustworthy systems are valuable in terms of productivity, user satisfaction, improved services,

and resource efficiency.

The statement "while this is time-consuming, the benefits far out weights the time spent

on verification" is true because trusting the interconnected systems requires a series of

engagements that involve determining malfunctions, system shutdowns, or power outages, or

suboptimal performance which are all critical and time-consuming. Detection of such attacks on

cybersecurity requires considering behaviors of physical components and computerized

monitoring, control, and management systems (Microsoft, 2020). Detection of unsecured states

also requires designing of shut-down strategies. However, despite being time-consuming, the

benefits derived from verifying interconnected systems for trustworthiness outweigh its cost or

time spent in doing so.

Trustworthiness results in a series of benefits to the organization. First, a trusted system

strengthens the security of systems and thus prevent possible vulnerabilities to system

functionality. A trusted system reduces vulnerabilities and related risks by ensuring there is

immediate remediation of threats. Once such threats are eliminated the benefits of the system

from confidentiality, integrity, and authentication of information which may be subject to leak or
TECHNOLOGY 3

tamper (Neumann, 2017). Trustworthiness fosters limited or no access to the systems by

unauthorized individuals who may render it vulnerable. Network design and configuration,

physical security, system maintenance, and procurement processes are some of the enhanced

activities achieved with trustworthy systems. Other companies that use the same means of

ensuring trustworthiness using SDL include Adobe and Aetna.


TECHNOLOGY 4

Reference

Microsoft (2020). Microsoft Security Development Lifecycle (SDL). Retrieved

from https://www.microsoft.com/en-us/securityengineering/sdl

Neumann, P. G. (2017). Trustworthiness and truthfulness are essential. Communications of the

ACM, 60(6), 26-28. http://dx.doi.org/10.1145/3084344

You might also like