2020
DOI: 10.1109/access.2020.3007355
|View full text |Cite
|
Sign up to set email alerts
|

Adaption of a Secure Software Development Methodology for Secure Engineering Design

Abstract: With the rapid advancement of technologies in the era of Industry 4.0, the interconnected nature of operations and systems is introducing a rapidly changing landscape of digitized and connected systems. Cybercrime is considered as possibly the greatest threat to connected systems worldwide, and therefore there exists a large drive in engineering to include cybersecurity in the design, development and maintenance of smart cyber-physical systems. Traditionally, the cybersecurity space was considered the responsi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(33 citation statements)
references
References 6 publications
0
30
0
Order By: Relevance
“…As it can be observed from the findings of this study, security risks are reported more frequently in the design phase of SDLC. The following are some of the most common security problems that occur during software design are [6,20,69,[72][73][74]: i. Lack of developing threat modeling during the design phase ii.…”
Section: ) Lack Of Proper Attention To Security Issues During the Design Phase (Freq 77/121)mentioning
confidence: 99%
See 4 more Smart Citations
“…As it can be observed from the findings of this study, security risks are reported more frequently in the design phase of SDLC. The following are some of the most common security problems that occur during software design are [6,20,69,[72][73][74]: i. Lack of developing threat modeling during the design phase ii.…”
Section: ) Lack Of Proper Attention To Security Issues During the Design Phase (Freq 77/121)mentioning
confidence: 99%
“…Identify the operating environment of the system SREP2. 6 Use concerns related to business to motivate security requirement elicitation SREP2.7…”
Section: B Practices For Developing Secure Software (Answer Rq2)mentioning
confidence: 99%
See 3 more Smart Citations