SOFSEC1 – Software Security
Module 1: Introduction to Software Security
Prof. Justin Pineda
Jan 2026
About the Faculty: Justin Pineda
Industry
Certs
Academe
Pineda Cybersecurity
Alorica
Ingram Micro
Bnext Inc.
JG Summit Holdings Inc.
The Coca-Cola Company
Silversky/Perimeter Security
DPO ACE, CISSP, ISO/IEC 27032, ISO/IEC 27035, ISO 27034, ISO 42001, ISO 27001, CISM, CEH, GWAPT, GMOB, CEH, Security+, CCNA, IBM DB2, ISO 27002, Cato SASE, Parallels RAS, ITILv3, APMG CISM, ISC2 Trainer
Asian Institute of Management (AIM)
DLS-CSB
Asia Pacific College
LPU
NU
San Beda
Mapua
TIP
Page 2
Learning Process
Read Materials
Join the Lecture
Share Insights
Answer the Assessment
Learning Objectives
Motivation Question
Why do breaches still happen despite firewalls and security tools?
What is Software Development?
Software Development Life Cycle (SDLC)
What Is Software Security?
Why Software Security Matters
Cybersecurity Across the SDLC
Weak Point: Requirements Phase
Weak Point: Design Phase
Weak Point: Implementation Phase
Weak Point: Testing Phase
Weak Point: Deployment Phase
Weak Point: Maintenance Phase
Threat Actor Perspective
Summary
Knowledge Check 1
Which SDLC phase presents the highest long-term security risk when security is completely ignored, even if later phases apply security testing?
Knowledge Check 2
A development team skips formal requirements documentation and relies on verbal instructions. From a cybersecurity perspective, what is the most likely outcome?
Knowledge Check 3
Which security activity is best suited for the Design phase of the SDLC?
Knowledge Check 4
Why do threat actors prefer exploiting logic flaws rather than technical vulnerabilities?
A. Logic flaws require advanced malware
B. Logic flaws are easier to automate
C. Logic flaws are rarely detected by security tools
D. Logic flaws exist only in legacy systems
Knowledge Check 5
Which statement best reflects the relationship between SDLC and cybersecurity?
A. Cybersecurity is mainly a concern during testing and deployment
B. Secure coding eliminates the need for secure design
C. Cybersecurity is an overlay added after development
D. Cybersecurity must be embedded across all SDLC phases
Key Takeaways
References
Group Exercise 1: Web Application Security Evaluation
Group Instructions
Industry to choose from: