{"id":51533,"date":"2022-12-11T17:56:34","date_gmt":"2022-12-11T17:56:34","guid":{"rendered":"https:\/\/www.essaybishops.co.uk\/compare-and-contrast-software-development\/"},"modified":"2022-12-11T17:56:34","modified_gmt":"2022-12-11T17:56:34","slug":"compare-and-contrast-software-development","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/compare-and-contrast-software-development\/","title":{"rendered":"Compare and Contrast Software Development"},"content":{"rendered":"<p>Compare and Contrast Software Development<\/p>\n<p>Step 7: Compare and Contrast Software Development Methodologies<br \/>\nOpen source developed software methodology is a model that focuses on making the source code available to the general public for utilization or adjustment from its original design. Open-source code is supposed to be a joint effort, where programmers enhance the source code and share the changes within the community (Fogel, 2015). Open source is free. There are little or no upfront expenses for open-source software. An organization can apply this system for as long as they want without thinking of making payments for any installation, activation and monthly subscription costs. The version is not supported. People require a license to operate them. The terms of a software license are used to release the code. Depending on the terms of license, other people may then download, adjust, and publish their edition back to the community. Open-source is easily modifiable. This is because users are given access to the source code. Security is not guaranteed. This is because there are always hundreds of developers that work on these platforms, and as such, there is a probability that some of them may have malicious intentions. Open-source provides room for potential and external ideas because it allows many developers and users to work on it (Fogel, 2015). The model addresses various cybersecurity issues, and they include buffer overflow, SQL injection, \u201cday zero attacks,\u201d and source-dependent attacks.<br \/>\nCommercially developed software methodologies focus on designing and developing software for sale or licensing to end users or software that is to be used for commercial purposes. These models are paid for. The expenses include but are not limited to base fee for software, annual licensing and support fees, and fees for integration and services. The version is supported, since providers aim to keep the paying customer happy. One requires a license to operate them. This model cannot be modified. Source codes are usually not made available to users, and therefore, there is no way an organization can make any changes to it. Security is guaranteed. Source code is made unavailable to the public, and this makes it less vulnerable to cyber attackers (O&#8217;Neill, 2011). A number of cybersecurity issues are addressed by this software development methodology; they encompass source-independent attacks, Denial of Service (DoS) attacks, rootkits, and Trojans.<br \/>\nAs the name suggests, internally developed software methodologies are perceived to be for internal use only or models that meet the internal needs of an organization. These models are costly. The expenses vary from a couple of thousands to a few hundred thousand dollars, and the cost depends on the intricacy of the system wanted. The providers of this model offer constant support. One requires a license to operate them. The model cannot be modified. This is because users are denied access to the source code, and it is nearly always kept secret (Tiako, 2019). Security is guaranteed. Software is developed for the organization, and thus secured and controlled by it. The cybersecurity issues that internally developed software methodologies tackle includes the following: man-in-the middle attacks, brute force attacks, and phishing.<br \/>\nStep 8: Software Development Matrix<br \/>\nThe pros and cons of open source, commercial, and internally developed software development methodologies<br \/>\nOpen-source<br \/>\nPros<br \/>\n\u2022\tThis model is free. There are little or no upfront expenses for open-source software.<br \/>\n\u2022\tIt provides a free-code analysis to the public.<br \/>\nCons<br \/>\n\u2022\tSoftware assurance needs and expectations are high. This is because it is vulnerable to attacks because the source code is readily available to the public.<br \/>\nCommercial<br \/>\nPros<br \/>\n\u2022\tSoftware assurance needs and expectations are low. This is because it is way more secure since its source code is not availed to the public.<br \/>\n\u2022\tThis software conforms to the functional objective and works as planned.<br \/>\n\u2022\tThe software development plan offer confidence in the interim and end products<br \/>\nCons<br \/>\n\u2022\tIt is expensive. The expenses such as base fee for software, annual licensing and support fees, and fees for integration and services make this model costly.<br \/>\nInternal<br \/>\nPros<br \/>\n\u2022\tSoftware assurance needs and expectations are low. This is because it is way more secure since its source code is not availed to the public.<br \/>\n\u2022\tThis model does not negatively affect safety and it contributes to the safety of the system.<br \/>\nCons<br \/>\n\u2022\tIt is very costly. License fees associated with this model can be quite high.<br \/>\nMatrix: comparison<br \/>\nDetails\tOpen-source\tCommercial\tInternal<br \/>\nDescription \tFocuses on making the source code available to the general public for utilization or adjustment from its original design\tFocus on designing and developing software for sale or licensing to end users or software that is to be used for commercial purposes\tDesigned and developed for internal use only or to meet the internal needs of an organization<br \/>\nCost \tThere are little or no upfront expenses for open-source software. \tCost is high, and the expenses include but are not limited to base fee for software, annual licensing and support fees, and fees for integration and services.<br \/>\nCosts associated with this system are high<\/p>\n<p>Support\tThe version is not supported\tThe version is supported. This is attributable to the fact that service providers strive to keep the paying customer happy\tThe providers offer constant support.<br \/>\nLicensure\tOne requires a license to operate them\tOne requires a license to operate them\tOne requires a license to operate them<br \/>\nSource code\tUsers are given access to source code.\tUsers are denied access to the source code\tUsers are denied access to the source code<br \/>\nFlexibility\tThey are easily modifiable\tCannot be modified\tCannot be modified<br \/>\nSecurity\tSecurity is not guaranteed\tSecurity is guaranteed.\tSecurity is guaranteed.<br \/>\nIdeas\tProvide room for potential and external ideas\tIdeas restricted to software developers\tIdeas restricted to software developers<br \/>\nCybersecurity issues addressed\tBuffer overflow, SQL injection, \u201cday zero attacks,\u201d and source-dependent attacks.<br \/>\nSource-independent attacks, Denial of Service (DoS) attacks, rootkits, and Trojans.<br \/>\nman-in-the middle attacks, brute force attacks, and phishing<\/p>\n<p>References<br \/>\nFogel, K. (2015). Producing Open Source Software: How to Run a Successful Free Software<br \/>\nProject. Sebastopol, CA: O&#8217;Reilly Media.<br \/>\nO&#8217;Neill, E. (2011). User-Developer Cooperation in Software Development: Building<br \/>\nCommon Ground and Usable Systems. Berlin, Germany: Springer Science &amp; Business Media.<br \/>\nTiako, P. (2019). Software Applications: Concepts, Methodologies, Tools, and Applications:<br \/>\nConcepts, Methodologies, Tools, and Applications. Hershey, PA: IGI Global.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compare and Contrast Software Development Step 7: Compare and Contrast Software Development Methodologies Open source developed software methodology is a model that focuses on making the source code available to\u2026<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7420,7421,7422,6845,7419,7424,7423,7259],"tags":[642,618,7425,576,116,631,19,643,473,633,630,628,450,597,594,626,635,574,622,624,620,621,619,623,617,625,627,634,629,632,644,645,42,66],"class_list":["post-51533","post","type-post","status-publish","format-standard","hentry","category-best-dissertation-writing-services","category-best-research-paper-writing-services","category-college-paper-writing-service","category-dissertation-writing-services-cost","category-dissertation-writing-services-near-me","category-dissertation-writing-services-reviews","category-legit-research-paper-writing-services","category-thesis-writing-services","tag-apps-that-write-essays-for-you-free","tag-assignment-writing-services-in-usa","tag-bes","tag-best-dissertation-writing-services","tag-best-essay-writing-service","tag-best-paper-writing-services","tag-best-research-paper-writing-services-in-usa","tag-best-website-to-write-my-essay","tag-cheap-essay-writing-service","tag-cheap-research-paper-writing-service","tag-college-paper-writing-service","tag-dissertation-help-online","tag-dissertation-writing-services","tag-dissertation-writing-services-illegal","tag-dissertation-writing-services-near-me","tag-dissertation-writing-services-usa","tag-essay-writing-service","tag-free-dissertation-writing-services","tag-homework-essay-writer","tag-homework-essay-writer-free","tag-homework-help-global","tag-homework-help-services","tag-homework-help-usa","tag-homework-writing-help","tag-homework-writing-service","tag-legit-research-paper-writing-services","tag-legitimate-dissertation-writing-services","tag-research-paper-writer-online-free","tag-research-paper-writing-services-online","tag-research-paper-writing-websites","tag-write-my-essay-for-me-cheap","tag-write-my-essay-for-me-tik-tok","tag-write-my-essay-free","tag-write-my-paper"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/51533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=51533"}],"version-history":[{"count":0,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/51533\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=51533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=51533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=51533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}