Develop a summary discussing the development processes in (How can cybersecurity professionals prevent hacks? Is the best methodology an offensive or defensive strategy?) Whether this be the utilization of customer off-the-shelf software in conjunction with a few script modules or a full-blown development project, it is necessary to discuss what would be needed to secure the application in conjunction with your systems, infrastructure, and processes. Ensure to include a summary of what you would do and how you would do it.