Aspects of Enhancing Security in Software Development Life Cycle
2017
Abstract
Softwares have become an integral part of everyday life. Every day, millions of people perform transaction through various applications run by these softwares as internet, ATM, mobile phone, email etc. Softwares are used by people bearing in mind that it is reliable and can be trusted upon and the operations they perform is secure. Now, if these softwares have ensembled security holes, then how can they be safe for use? Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. Because of the limitation of budget and release time of the software into the market, many developers consider security as an afterthought thus resulting in poor quality software. In the early days, software security was only considered as part of software testing but, later on, it has been experienced that security is not an afterthought in case of software development[16][1...
References (16)
- C. Banerjee, S. K. Pandey, "Software Security Rules: SDLC Perspective", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No.1, 2009
- Agarwal, A. 2006), "How to integrate security into your SDLC", Available at: http://searchsoftwarequality.techtarget.com/tip/0,289483,sid92_gci1174897,00 .html,
- Meier, J. D., Mackman, A. And Wastell, B.(2005), "Threat modelling web applications", Available at: http://msdn.microsoft.com/enus/library/ms 978516.aspx
- Redwine, S. T. Jr and Davis, N.; et al, (2004), "Process to produce secure software: Towards more secure software", National Cyber Security Summit, Vol. 1
- McGraw, G. (2006), "Software security: building security in", Addison- Wesley, Boston, MA
- Redwine, S. T. Jr and Davis, N.; et al, (2004), "Process to produce secure software: Towards more secure software", National Cyber Security Summit, Vol. 1
- Gegick, M. and Williams, L. (2006), "On the design of more secure software- intensive systems by use of attack patterns", Information and Software Technology, Vol. 49, pp 381-397.
- Ralston, P.A.S; Graham, J.H and Hieb, J. L. (2007), "Cyber security risk assessment for SCADA and DCS networks", ISA Transaction, Vol.46(4), pp583-594
- Gegick, M. and Williams, L. (2006), "On the design of more secure software- intensive systems by use of attack patterns", Information and Software Technology.
- Security Assessment of Software Design using Neural Network A. Adebiyi, Johnnes Arreymbi and Chris Imafidon School of Architecture, Computing and Engineering University of East London, London, UK.
- Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw,Nancy R. Mead: Software Security Engineering: A Guide for Project Managers, Addison Wesley Professional, 2008, pp 6-8.
- Srinivasa, K.D. and Sattipalli, A. R, (2009), "Hand written character recognition using back propagation network", Journal of Theoretical and Applied Information Technology, Vol. 5(3), pp 257-269
- J. Wing, "A Call to Action: Look Beyond the Horizon," IEEE Security & Privacy, vol. 1, no. 6, 2003,.
- G. McGraw, "Building Secure Software: Better than Protecting Bad Software(Point/Counterpoint with Greg Hoglund)," IEEE Software, vol. 19, no. 6, 2002, .
- Anurag Agarwal, -Threat modeling enhanced with misusecases, searchsoftwarequalitytechtarget.comhttp://searchsoftwarequality.techtarget.co m/t.html,Aug.2,2008.
- Anuradha Sharma, Dr. Praveen Kumar Misra, "Secure Software Requirement Specification", presented and published at International Conference on Recent Trends in Engineering, Technology and Management, Bundelkhand Institute of Engineering and Technology,2011, ISSN 978-93-80697-69-7.