For Web Application Security Projects.

Slides:



Advertisements
Similar presentations
Systems Analysis and Design in a Changing World
Advertisements

Chapter 8: Evaluating Alternatives for Requirements, Environment, and Implementation.
Introduction to Integrated Library Systems
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Government Services How to Respond to a Request for Proposal (RFP) 2006.
Enterprise Content Management Pre-Proposal Conference for RFP No. ISD2006ECM-SS December 6, 2006 California Administrative Office of the Courts Information.
© Prentice Hall CHAPTER 10 Alternative Approach: Purchasing Systems.
IS4799 Information Systems and Cybersecurity Capstone Project
Project Bidding Procedures Enhancing Data and Presentation Skills for Engineers EDASPE Writing the RFP Training Courses – July 2004.
Final Report Document. Format Title Page Executive Summary Table of Contents Introduction Mission Statement Main PDS items Brief justification of the.
Chapter 13: Preparing the System Proposal Instructor: Paul K Chen.
8 Systems Analysis and Design in a Changing World, Fifth Edition.
AD description template definition Marián Mlynarovič FIIT Lectures 2006.
1 OUTLINE Need of a Proposal (why do we need a proposal?) Definition Types Elements of Winning Business Proposals Criteria for Proposals Writing Process.
Chapter 3 Project Initiation. The stages of a project  Project concept  Project proposal request  Project proposal  Project green light  Project.
WELCOME TO THE PROCUREMENT SEMINAR Procurement and Contracts An Overview of Contract Administration.
Collaborative Report Writing the Proposal. Definition Proposal: a document written to convince your audience to adopt an idea, a product, or a service.
Concept Analysis Document Executive Summary Template, (To view template instructions – Save this template to project files, reopen and then select View,
Typical Software Documents with an emphasis on writing proposals.
1 Lecture 3.9: RFP, SOW and CDRL (SEF Ch 19) Dr. John MacCarthy UMBC CMSC 615 Fall, 2006.
PROPOSING TO WRITE A PROPOSAL? BY PAPIA BAWA. What are Proposals? Long reports usually written in response to a specific request or in response to your.
Purchasers’ Showcase 2007 Successful Bidding in the Public Sector March 2007.
Small Business Consulting Project Guidelines. 2 Milestones Conduct Phase I (Initial Client Interview) by Monday April 6th Complete Phase I (Description)
NETE Computer Network Analysis and DesignSlide 1 Documenting Network Design NETE-4635 Computer Network Analysis and Design.
Proposals and Progress Reports
Art 155 Information Architecture In-class Presentation Week 1B.
PROPOSALS.
Information Architecture Week 1. Information Architecture CALENDAR.
Workshop #1: Introduction to Graduation Project Wednesday September 2 nd at 10 am Capstone Committee Department of Computer Science.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Introduction Software Project Management Plan Software Requirements Specifications Software Design Description Software Test Result.
ACC 542 Entire Course For more classes visit ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week.
Preparing & Evaluating RFPs The PMO Role Kim Brain Senior Project Manager, Brain Works Consulting, LLC.
ACC 542 Entire Course FOR MORE CLASSES VISIT ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week.
ACC 542 homework / acc542homeworkdotcom. ACC 542 Entire Course ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week 2 Learning.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Evaluation. What is important??? Cost Quality Delivery Supplier Expertise Financial Stability Coverage Product Offerings Do you intend to negotiate?
DEVRY PROJ 410 W EEK 3 DQ 1 Check this A+ tutorial guideline at For more classes visit
DEVRY PROJ 410 W EEK 3 DQ 1 Check this A+ tutorial guideline at For more classes visit
Advanced Higher Computing Science
Project Management PTM721S
Project Management – PTM712S
Systems Analysis and Design in a Changing World, Fifth Edition
Program Design Chapter 5
Chapter 8 Environments, Alternatives, and Decisions.
Business Proposal.
Completing Reports and Proposals
ACC 542 Course Inspiring Minds / tutorialrank.com
COMP390/3/4/5 Final Year Project Demonstration & Dissertation
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
^ About the.
2 Selecting a Healthcare Information System.
COMP390/3/4/5 Final Year Project Demonstration & Dissertation
Property Management Web Design
Completing Reports and Proposals
Case Study for Indian Petroleum Client
MANDATORY PRE-BID MEETING
COMP390/3/4/5 Final Year Project Demonstration & Dissertation
Chapter 19 Proposals and Requests for Proposals
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Unit 5 – eProject – Starting to look at projects Unit 5
National University of Laos
Selecting a Health Care
How do you prepare a request for proposal (RFP)?
CIC BIM Competition Presentation Template & Content Guide
COMP390/3/4/5 && COMP593 Final Year Projects Demonstration & Dissertation Irina Biktasheva
INTOSAI IT AUDIT TRAINING
Overview of The Bidder Response Form and Changes to the IT RFP Template March 8, 2019.
COMP390/3/4/5 Final Year Project Demonstration & Dissertation
Radiopharmaceutical Production
Presentation transcript:

For Web Application Security Projects. OWASP RFP Criteria. For Web Application Security Projects.

Table of Contents. 3. Recommended RFP Questions 1. Introduction 2. Recommended Information the Client should provide to Service Providers/Vendors. 3. Recommended RFP Questions

1. Introduction

Introduction: A Request For Proposal, (RFP) is a call made by an organization soliciting for bids by service providers or vendors to meet a need and it is often done by documents. The information provided in RFPs are important and when you create an RFP for an Application Security Verification project , emphasis should be on providing clear information about the scope of verification activities and evaluation criteria so prospective service providers and vendors can submit proposals that are comparable. References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf

2. Recommended Information the Client should provide to Service Providers/Vendors.

Provide details about: Lines of Code Number of Dynamic Pages. An Inventory of user roles and role descriptions. Brief Application Summary and Application Architecture. Degree of Verification Required. The frequency or duration for performing verification. References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf

2. Recommended RFP Questions.

Number of Dynamic Pages. Ask Service Providers/Vendors to Provide details on: Lines of Code Number of Dynamic Pages. An Inventory of user roles and role descriptions. Brief Application Summary and Application Architecture. Degree of Verification Required. The frequency or duration for performing verification. References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf

Application Security Verification Methodology. Security Coverage. Ask Service Providers/Vendors to Provide details on: Company Background. Application Security Verification Methodology. Security Coverage. Application Coverage. Risk Evaluation. Differentiators. Scope. Security. References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf

Client Support Details. Pricing/Licensing Information. Ask Service Providers/Vendors to Provide details on: Burden. Reporting Interface. Innovation. Integration. Benefits. Supporting Services. . Client Support Details. Pricing/Licensing Information. References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf