2015
DOI: 10.5120/21261-3355
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Secure Software Design and their impact on Application

Abstract: Vulnerability is associated with the system and it is a big risk for system and result in surplus maintenance cost. It is due to many reasons those are not considered during the stages of System Development Life Cycle (SDLC). During SDLC it may be reduced to minimum level. Millions of dollars waste due to vulnerable application and rescind working. Most of the software are not secure and cause Physical and Financial mutilation. It may not be possible to eliminate vulnerability completely but it might be reduce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2025
2025

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Vulnerabilities associated with the system may be reduced to a minimum level during the SDLC. It may not be possible to eliminate vulnerability, but it might be reduced to a minimum level if security is treated as an ongoing process . Therefore, this research looks at the software development process as a whole, from the perspective of each development phase (SDLC), and seeks to determine important secure measures that must be employed at each phase to ensure highly secure products.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Vulnerabilities associated with the system may be reduced to a minimum level during the SDLC. It may not be possible to eliminate vulnerability, but it might be reduced to a minimum level if security is treated as an ongoing process . Therefore, this research looks at the software development process as a whole, from the perspective of each development phase (SDLC), and seeks to determine important secure measures that must be employed at each phase to ensure highly secure products.…”
Section: Introductionmentioning
confidence: 99%
“…In many cases, it is only considered after the design of the system is completed or when a significant issue must be addressed. Currently, no software development processes or practices exist that consistently produce secure software . Therefore, it is recommended that developers adopt practices that can reduce software defects and, as a result, minimize any potential risk because of the lack of security attention during the process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To reduce accidental addition of vulnerability Secure Design Pattern (SDP) are used. Secure Strategy Design Pattern (SSDP) and Secure Builder Design Pattern (SBDP) were introduced and implemented in a web application [2]. SSDP is actually addition in working of Strategy design pattern and SBDP is extension in Builder design pattern.…”
Section: Related Workmentioning
confidence: 99%
“…Attackers cause problems by exploiting vulnerabilities in code [1]. Vulnerability is also known as a fault in the security of an information system that some time may be known or unknown [2]. Vulnerability is simply a design flaw or an implementation bug that allows a potential attack on the software in some way [1].…”
Section: Introductionmentioning
confidence: 99%