Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

被引:16
作者
Humayun, Mamoona [1 ]
Jhanjhi, N. Z. [2 ]
Almufareh, Maram Fahhad [1 ]
Khalil, Muhammad Ibrahim [3 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[3] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 71卷 / 03期
关键词
Security; secure software development; software development life cycle (SDLC); confidentiality; integrity; availability; KNOWLEDGE MANAGEMENT; MATURITY MODEL; DESIGN; CHALLENGES; ISSUES; SDLC;
D O I
10.32604/cmc.2022.019289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capabilitymaturitymodel integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the "patch and penetrate" strategy, inwhich security is accessed once the job is completed. Increased cost, time overrun, not integrating testing and input in SDLC, usage of third-party tools and components, and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC, despite the fact that secure software development is essential for business continuity and survival in today's ICT world. There is a need to implement best practices in SDLC to address security at all levels. To fill this gap, we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines. We proposed a secure SDLC framework based on the identified practices, which integrates the best security practices in various SDLC phases. A mathematical model is used to validate the proposed framework. A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC, resulting in more secure applications.
引用
收藏
页码:5039 / 5059
页数:21
相关论文
共 85 条
[1]   Developers Need Support, Too: A Survey of Security Advice for Software Developers [J].
Acar, Yasemin ;
Stransky, Christian ;
Wermke, Dominik ;
Weir, Charles ;
Mazurek, Michelle L. ;
Fahl, Sascha .
2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, :22-26
[2]  
Adanna A. A., 2020, IUP J INFORM TECHNOL, V16, P39
[3]   A Maturity Model for Secure Software Design: A Multivocal Study [J].
Al-Matouq, Hassan ;
Mahmood, Sajjad ;
Alshayeb, Mohammad ;
Niazi, Mahmood .
IEEE ACCESS, 2020, 8 :215758-215776
[4]  
Alenezi M., 2019, INT J RECENT TECHNOL, V8, P13, DOI DOI 10.35940/IJRTE.C5374.098319
[5]  
Alferidah Dhuha Khalid, 2020, 2020 International Conference on Computational Intelligence (ICCI), P103, DOI 10.1109/ICCI51257.2020.9247722
[6]  
Alferidah DK, 2020, INT J COMPUT SCI NET, V20, P263
[7]   Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification [J].
Ali, Ishfaq ;
Asif, Muhammad ;
Shahbaz, Muhammad ;
Khalid, Adnan ;
Rehman, Mariam ;
Guergachi, Aziz .
IEEE ACCESS, 2018, 6 :73928-73939
[8]   Secure design for cloud control system against distributed denial of service attack [J].
Ali Y. ;
Xia Y. ;
Ma L. ;
Hammad A. .
Control Theory and Technology, 2018, 16 (01) :14-24
[9]  
Alvi A. K., 2021, J SYST SOFTWARE, V171
[10]  
Amalia F., 2020, J INFORM TECHNOLOGY, V5, P247