Security Responses in Software Development

نویسندگان

چکیده

The pressure on software developers to produce secure has never been greater. But what does security look like in environments that do not security-critical software? In answer this question, multi-sited ethnographic study characterizes episodes and identifies five typical behaviors development. Using theory drawn from information motivation research engineering, article key ways which individual form responses meet the demands of particular circumstances, providing a framework managers teams can use recognize, understand, alter activity their environments.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security enforcement aware software development

In the domain of security policy enforcement, the concerns of application developers are almost completely ignored. As a consequence, it is hard to develop useful and reliable applications that will function properly under a variety of policies. This paper addresses this issue for application security policies specified as security automata, and enforced through run-time monitoring. Our solutio...

متن کامل

IT Security in Automotive Software Development

In the last years, automotive systems evolved to be more and more software-intensive systems. As a result, considerable attention has been paid to establish an efficient software development process of such systems, where reliability is an important criterion. Hence, model-driven development (MDD), software engineering and requirements engineering (amongst others) found their way into the syste...

متن کامل

Security Deliberations in Software Development Lifecycle

Security is a serious problem in software development which when not taken into consideration, exploits vulnerabilities in software. Such security related problems need to be addressed as early as possible while building software. Security problems exist for many reasons. A major thing is that, software cannot resist security attacks. Software security vulnerabilities are often caused due to th...

متن کامل

Towards Analyzing Security-Critical Software During Development

We describe an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, speciic system vulnerabilities are patched. We make a case for applyin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Software Engineering and Methodology

سال: 2023

ISSN: ['1049-331X', '1557-7392']

DOI: https://doi.org/10.1145/3563211