2021
DOI: 10.1155/2021/6677867
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Abstract: Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The use of such components in a newly developed software system can save effort, time, and many resources. Due to the practice of using components for new developments, security is one of the major concerns for researchers to tackle. Security of software components can save the software from the h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 137 publications
0
2
0
2
Order By: Relevance
“…These SLR guidelines have three key steps, which are planning the review, conducting the review, and reporting the review. A similar approach was applied by many other researchers in their studies 41–54 . We will discuss in detail below all in SLR protocols.…”
Section: Methodsmentioning
confidence: 99%
“…These SLR guidelines have three key steps, which are planning the review, conducting the review, and reporting the review. A similar approach was applied by many other researchers in their studies 41–54 . We will discuss in detail below all in SLR protocols.…”
Section: Methodsmentioning
confidence: 99%
“…Untuk mendukung penggunaan metode ISO 27005 penulis melakukan studi literatur terdahulu dengan studi kasus yang berasal dari Indonesia. Dari beberapa penelitian ditemukan NIST SP 800-30 digunakan sebagai pelengkap proses analisa risiko pada ISO 27005 [11] Penilaian Risiko pada ISO 27005, digambarkan dengan persegi berwarna kuning pada Gambar I, merupakan proses inkremental yang dimulai dari Identifikasi Risiko hingga Evaluasi Risiko. Artinya jika penilaian risiko tidak memenuhi penilaian yang memuaskan maka perlu dilakukan penilaian kembali dimulai dari penetapan konteks hingga akhir proses penilaian risiko sampai memenuhi kondisi yang memuaskan.…”
Section: B Penilaian Risiko Keamanan Informasiunclassified
“…ISO 27005:2018 Berdasarkan hasil evaluasi menggunakan CURF pada studi yang dilakukan oleh Wangen (2017)[9], penulismenemukan bahwa ISO 27005 menerima skor tertinggi. ISO 27005 juga dapat digunakan sesuai dengan kondisi[11] untuk semua tipe organisasi[13].ISO 27005:2018 adalah sebuah standar internasional untuk MRKI yang dibangun oleh International Organization for Standardization (ISO) dan International Electrotechnical Commission (IEC). Menyediakan pedoman untuk penilaian risiko keamanan informasi di dalam sebuah organisasi, terutama penilaian risiko berdasarkan ISO/ IEC 27001[8].…”
unclassified
“…Internet of Things (IoT) is one of the latest concepts in the current age. The future of this globe is IoT which will be going to alter today's world objects into intelligent and smart objects [1]. The term IoT was introduced in the late 1990s, yet any other components like semiconductors and wireless networks exist for quite a long time [2].…”
Section: Introductionmentioning
confidence: 99%