Software Development Life Cycle (SDLC) is the process companies follow to produces quality software in an efficient, supportable, and timely way. SDLC has undergone as many changes over the last 50 years as computers themselves have, And yet, there still remains a key framework for understanding how to develop and delivery software products. SDLC is broken up into the following stages:
There are other phases which sometimes get inserted as well such as Deployment (particularly important to Cloud environments today). However, in general, this is known as the Software Development Life Cycle (SDLC).
Other topics CyberHoot will dive into include methods of developing code such as Waterfall vs. Agile development styles.
Source: Techopedia
Additional Reading:
The Secure Software Development Life Cycle: Syncing Development and Security
Agile Versus Waterfall Approach to Software Development
Related Terms: Closed Source Software, Commercial Off The Shelf (COTS), Software End of Life/End of Support, Open Source Software
SMBs shouldn’t be concerned about this topic unless they are in the world of creating applications or coding. This framework is mainly for software engineers or application testers, looking for ways to improve the quality of their development efforts. If you’re an SMB developing software, then you’re likely already intimately familiar with SDLC. You will need to consider what project management style you will follow for your development shop which is covered partly in the video below. Various project management methodologies are used in SDLC today but two PM methods are used heavily: “Waterfall” and “Agile” project management methodologies. Watch the video below to learn more on how these PM methods overlap with SDLC.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.