Security considerations for the spiral development model

نویسنده

  • Loye Lynn Ray
چکیده

Security measures have been well established within the waterfall development life cycle model. However, more software projects are using the spiral development life cycle model. Software developers and project managers can easily forget about adapting security measures within this new approach (Daud, 2010). The spiral model uses iterative steps that can create changes in each phase of software development process. This will challenge security to ensure the application has few flaws or vulnerabilities that could be exploited. Failure to impose the right security measures at each of these phases can open up vulnerabilities for hackers to exploit and prove costly in patching. This paper will explore areas where security can be engaged within each iteration step of the spiral development model. This way security can continue protection of the software product as it becomes ready for deployment. The paper is broken down into sections describing the spiral development model and what security methods are needed at each step. The first section describes an overview of spiral development model to set the framework of where security will be suggested. The next section describes security methods recommended at different parts of spiral development model. The paper will help organizations realize where to deploy security measures to reduce vulnerabilities in the software application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Heat transfer enhancement in a spiral plate heat exchanger model using continuous rods

This study presents an innovative and simple way to increase the rate of heat transfer in a spiral plate heat exchanger model. Several circular cross-section rods, as continuous vortex generators, have been inserted within the spiral plate heat exchanger in the cross-stream plane. The vortex generators are located at various azimuth angles of α=30◦, 60◦, 90◦, and 120◦ with non-dimensional diame...

متن کامل

A Spiral / Reverse Spiral Life Cycle Model for Information Systems Risk Assessment

In this paper we present an spiral/reverse spiral life cycle model for analysis of security risks of information systems. Protection of the information services is modeled into the interactions between the “attackers” and the “defenders”, i.e., system operators and developers. When a development team creates a software system, it produces both the desired functionality and security flaws. Consi...

متن کامل

An Efficient Technique for Substrate Coupling Parasitic Extraction with Application to RF/Microwave Spiral Inductors (RESEARCH NOTE)

This paper presents an efficient modeling method, based on the microstrip lines theory, for the coupling between a sub­strate backplane and a device contact. We derive simple closed-form formulas for rapid extraction of substrate parasitics. We use these formulas to model spiral inductors as important substrate-noise sources in mixed-signal systems. The proposed model is verified for the freque...

متن کامل

Applying process programming to the spiral model

The Spiral Model [Boehm,19S6; Belz,19S6] provides a candidate approach to determining the requirements, architecture, and design of a software process. The Spiral Model activity of determining mission objectives and constraints addresses the requirements for the process: the nature of the product required; budget and schedule constraints; organizational and procedural (e.g. contracting) constra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int J. Information Management

دوره 33  شماره 

صفحات  -

تاریخ انتشار 2013