Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

被引:16
作者
Humayun, Mamoona [1 ]
Jhanjhi, N. Z. [2 ]
Almufareh, Maram Fahhad [1 ]
Khalil, Muhammad Ibrahim [3 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[3] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 71卷 / 03期
关键词
Security; secure software development; software development life cycle (SDLC); confidentiality; integrity; availability; KNOWLEDGE MANAGEMENT; MATURITY MODEL; DESIGN; CHALLENGES; ISSUES; SDLC;
D O I
10.32604/cmc.2022.019289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capabilitymaturitymodel integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the "patch and penetrate" strategy, inwhich security is accessed once the job is completed. Increased cost, time overrun, not integrating testing and input in SDLC, usage of third-party tools and components, and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC, despite the fact that secure software development is essential for business continuity and survival in today's ICT world. There is a need to implement best practices in SDLC to address security at all levels. To fill this gap, we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines. We proposed a secure SDLC framework based on the identified practices, which integrates the best security practices in various SDLC phases. A mathematical model is used to validate the proposed framework. A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC, resulting in more secure applications.
引用
收藏
页码:5039 / 5059
页数:21
相关论文
共 85 条
[51]  
Malik S., 2017, International Journal of System Software Engineering, V5, P38
[52]   Secure Coding Practices in Java']Java: Challenges and Vulnerabilities [J].
Meng, Na ;
Nagy, Stefan ;
Yao, Danfeng ;
Zhuang, Wenjie ;
Argoty, Gustavo Arango .
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, :372-383
[53]   Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP [J].
Miller, Barton P. ;
Heymann, Elisa .
2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, :124-125
[54]   Exploring software security approaches in software development lifecycle: A systematic mapping study [J].
Mohammed, Nabil M. ;
Niazi, Mahmood ;
Alshayeb, Mohammad ;
Mahmood, Sajjad .
COMPUTER STANDARDS & INTERFACES, 2017, 50 :107-115
[55]   An empirical study to improve software security through the application of code refactoring [J].
Mumtaz, Haris ;
Alshayeb, Mohammad ;
Mahmood, Sajjad ;
Niazi, Mahmood .
INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 96 :112-125
[56]  
Nandhini K., 2020, ASIAN J APPL SCI TEC, V04, P01, DOI [10.38177/ajast.2020.4301, DOI 10.38177/AJAST.2020.4301]
[57]  
Nazir N., 2018, AM SCI RES J ENG TEC, V46, P247
[58]  
Niazi M., 2020, COMPUT SECUR, V95
[59]   Systematic Mapping of the Literature on Secure Software Development [J].
Nina, Hernan ;
Pow-Sang, Jose Antonio ;
Villavicencio, Monica .
IEEE ACCESS, 2021, 9 :36852-36867
[60]   Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice [J].
Papageorgiou, Achilleas ;
Strigkos, Michael ;
Politou, Eugenia ;
Alepis, Efthimios ;
Solanas, Agusti ;
Patsakis, Constantinos .
IEEE ACCESS, 2018, 6 :9390-9403