A Comparative Overview of the Most Common Methodologies for Secure Software Development

نویسنده

  • Golnaz Aghaee Ghazvini
چکیده

Security is a property of an entire system in context. Rather than a software product; so a thorough understanding of system security risk analysis is necessary in the entire software life cycle for a successful project. This aspect is strongly related to costs, risks and reputation of an organization. Focus on security in the software development life cycle can be divided into two distinct categories: Internal security and External security. Internal security of software depends on the security of codes and applications used in software development. External security of software includes measurements to maintain security in the interaction with the external environment. In recent years, many methods have been developed to maintain internal security of software. The main goal of this paper is to present and compare the most common methodologies provided to ensure the internal security of the software systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Similarities and di erences between CLASP , SDL , and Touchpoints : the activity - matrix

Development processes for software construction are common knowledge and mainstream practice in most development organizations. Unfortunately, these processes offer little support in order to meet security requirements. Over the years, research efforts have been invested in specific methodologies and techniques for secure software engineering, yet dedicated processes have been proposed only rec...

متن کامل

Integrating Security and Usability at Requirement Specification Process

To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers have undergone many methodologies and techniques to secure software development life-cycle. A critical review for the development of secure software, Security and its usability ...

متن کامل

Agile methods: a comparative analysis

The agile methods are systems development methodologies currently used in the software development industry both internationally and in New Zealand. This article provides an overview of the agile methods, including the key publication of each method, the major influences on the agile methods, and describes comparative studies where analysis and comparison of methodologies has been carried out. ...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014