CFP last date
20 June 2024
Reseach Article

A Critical Analysis on Security Aspects of Software Development Lifecycle

Published on October 2014 by Arghya Kusum Das, Sandip Rakshit
International Conference on Microelectronics, Circuits and Systems
Foundation of Computer Science USA
MICRO - Number 2
October 2014
Authors: Arghya Kusum Das, Sandip Rakshit
b7b2e3dc-fcaf-4982-97d9-35131df6667e

Arghya Kusum Das, Sandip Rakshit . A Critical Analysis on Security Aspects of Software Development Lifecycle. International Conference on Microelectronics, Circuits and Systems. MICRO, 2 (October 2014), 29-32.

@article{
author = { Arghya Kusum Das, Sandip Rakshit },
title = { A Critical Analysis on Security Aspects of Software Development Lifecycle },
journal = { International Conference on Microelectronics, Circuits and Systems },
issue_date = { October 2014 },
volume = { MICRO },
number = { 2 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 29-32 },
numpages = 4,
url = { /proceedings/micro/number2/18320-1818/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Microelectronics, Circuits and Systems
%A Arghya Kusum Das
%A Sandip Rakshit
%T A Critical Analysis on Security Aspects of Software Development Lifecycle
%J International Conference on Microelectronics, Circuits and Systems
%@ 0975-8887
%V MICRO
%N 2
%P 29-32
%D 2014
%I International Journal of Computer Applications
Abstract

This paper focuses on the security aspects of software. It analyses the various loopholes that can exist in the development of a software or the various damages that can be incorporated by malicious users, and also the remedies that when carefully undertaken can remove the vulnerabilities. This is an overview or study of security problems of different nature and the proper and systematic tackling methodology adopted to eradicate them and thereby also add value to its quality.

References
  1. Karen Mercedes Goertzel, Theodore Winograd, Holly Lynne McKinley,Patrick Holley, Booz Allen Hamilton , "Security in Software Lifecycle Making Software Development Processes and Software Produced by Them- More Secure", Department of Homeland Security , Draft Version 1. 2- August 2006 .
  2. Jayaram K R andAditya P Mathur ," Software Engineering For Secure Software - State Of The Art: A Survey" , CERIAS Tech Report 2005-67
  3. Ansar-Ul-Haque Yasar ,Davy Preuveneers ,Yolande Berbers ,Ghasan Bhatti, "Best Practices for Software Security : An Overview", In Proceedings of the 12th IEEE International Multitopic Conference, December 2008.
  4. Malik Imran Daud," Secure Software Development Model: A Guide for Secure Software Life Cycle", In Proceedings of the International MultiConference of Engineers and Computer Scientists 2010 Vol. I, Hong Kong.
  5. Mark Belk, Matt Coles, Cassio Goldschmidt, Michael Howard, Kyle Randolph," Fundamental Practises for Secure Software Development", February 2011.
  6. J. Christopher Westland " The Cost of Errors in Software Development :Evidence From Industry ",The Journal of Systems and Software, 62,2002,pp. 1-9.
  7. Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi ," Integrating Software Development Security Activities with Agile Methodologies " .
  8. Noopur Davis ,"Secure Software Development Life Cycle Processes: A Technology Scouting Report", December 2005.
  9. Golnaz Elahi ," Security Requirements Engineering: State of the Art and Practice and Challenges"
Index Terms

Computer Science
Information Sciences

Keywords

Software Security Software Threat. Software Risk