2017
DOI: 10.24297/ijct.v16i7.6467
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Design Methods for Secure Software Development

Abstract: I S S N 2 2 7 7 -3061 V o l u m e 1 6 N u m b e r 7 I n t e r n a t i o n a l j o u r n a l o f C o m p u t e r s a n d T e c h n o l o g y 7047 AbstractSoftware provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many security-specific concepts that should be determined as requirements during software development life cycle in order to deliver a strong and sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…This has come to be appreciated by researchers and practitioners as Secure Software Engineering (SSE). These practices have been incorporated into the general SDLCs by some approaches, including Microsoft Security Development Lifecycle (SDL) [16], McGraw's Touchpoints [17], and Comprehensive Lightweight Application Security Process (CLASP) from Open Web Application Security Project (OWASP) organization [18].…”
Section: Secure Software Development Conceptsmentioning
confidence: 99%
“…This has come to be appreciated by researchers and practitioners as Secure Software Engineering (SSE). These practices have been incorporated into the general SDLCs by some approaches, including Microsoft Security Development Lifecycle (SDL) [16], McGraw's Touchpoints [17], and Comprehensive Lightweight Application Security Process (CLASP) from Open Web Application Security Project (OWASP) organization [18].…”
Section: Secure Software Development Conceptsmentioning
confidence: 99%
“…The input data of a system is subjected to several logical or algorithmic processes that together create the information which is available to the user. One of the main risks of the systems is the security of its data, which cannot be effective unless the software design describes procedures and controls that ensure veracity and consistency in the entered data (Alhazmi et al, 2005;Rehman and Mustafa, 2009;Surakhi et al, 2017). From the auditor's point of view, the role played by the auditor is crucial within the organization, both in the software development process and in the planning and structure, in addition to ensuring that applications are built correctly and appropriately as agreed by the specialists, the project manager and the software engineering process (Fowler and Rifkin, 1990;Humphrey, 1988;Ross et al, 1975).…”
Section: Software Engineering Process 31 General Characteristicsmentioning
confidence: 99%