Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
نویسندگان
چکیده
Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, Availability). This only possible if security taken into account at all stages SDLC (Software Development Life Cycle). Various approaches software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating phases SDLC. One major causes pervasive vulnerabilities a failure prioritize security. Even most proactive companies use “patch penetrate” strategy, which accessed once job completed. Increased cost, time overrun, not integrating testing input SDLC, usage third-party tools components, lack knowledge are reasons paying attention angle during despite fact secure development essential business continuity survival ICT world. There need implement best practices address levels. To fill this gap, we provided detailed overview while taking care project costs deadlines. We proposed framework based on identified practices, integrates various phases. A mathematical used validate framework. case study findings show system aids integration overall resulting more applications.
منابع مشابه
supply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولpatterns and variations in native and non-native interlanguage pragmatic rating: effects of rater training, intercultural proficiency, and self-assessment
although there are studies on pragmatic assessment, to date, literature has been almost silent about native and non-native english raters’ criteria for the assessment of efl learners’ pragmatic performance. focusing on this topic, this study pursued four purposes. the first one was to find criteria for rating the speech acts of apology and refusal in l2 by native and non-native english teachers...
15 صفحه اولVulnerability discovery & software security
This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation does not exceed the regulation length of 60,000 words, including tables and footnotes, but excluding the bibliography and appendix. Acknowledgements My work has been supported at various times by a Marshall Scho...
متن کاملInternet Security, Vulnerability Disclosure, and Software Provision
In this paper, we examine how software vulnerabilities affect firms that sell software and consumers that purchase software. In particular, we model three decisions of the firm: (I) an upfront investment in the quality of the software to reduce potential vulnerabilities, (II) a policy decision whether to announce vulnerabilities, (III) and a price for the software. We also model two decisions o...
متن کاملassessment of deep word knowledge in elementary and advanced iranian efl learners: a comparison of selective and productive wat tasks
testing plays a vital role in any language teaching program. it allows teachers and stakeholders, including program administrators, parents, admissions officers and prospective employers to be assured that the learners are progressing according to an accepted standard (douglas, 2010). the problems currently facing language testers have both practical and theoretical implications but the first i...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.019289