Software Security Rules, SDLC Perspective

Computer Science – Software Engineering

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact F

Scientific paper

Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Software Security Rules, SDLC Perspective does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Software Security Rules, SDLC Perspective, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software Security Rules, SDLC Perspective will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-256225

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.