2022
DOI: 10.1002/spe.3072
|View full text |Cite
|
Sign up to set email alerts
|

Synthesizing secure software development activities for linear and agile lifecycle models

Abstract: Application security is an important concern, and security activities to support software development lifecycle processes, such as specification, design, implementation, and testing are increasingly in need. Despite the plethora of knowledge available for secure software development in online and books, software systems are seldom secure as developers lack security knowledge. The primary reason for this paradox is the diversity and overwhelming nature of the available security knowledge. In this article, we pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…This is a very novel aspect as it simultaneously integrates the teaching of agility and creativity. It is aimed to be used as an educational resource in training centers and software companies, to teach or improve their agile processes such as computer auditing, 50 scientific software projects, 51 computer security, 52 and perhaps one day in quantum computing when it is more developed 53 . It is considered a serious game as it incorporates a number of game design elements and techniques, using them outside the gaming context and allowing companies to achieve business benefits 18 …”
Section: Description Of the Educational Resourcementioning
confidence: 99%
“…This is a very novel aspect as it simultaneously integrates the teaching of agility and creativity. It is aimed to be used as an educational resource in training centers and software companies, to teach or improve their agile processes such as computer auditing, 50 scientific software projects, 51 computer security, 52 and perhaps one day in quantum computing when it is more developed 53 . It is considered a serious game as it incorporates a number of game design elements and techniques, using them outside the gaming context and allowing companies to achieve business benefits 18 …”
Section: Description Of the Educational Resourcementioning
confidence: 99%
“…This study also contributes to research on the relationship between software engineering and security engineering by exploring the links between the two disciplines and their impact on the industry. 57 Synthesizing secure software development activities for linear and agile lifecycle models [123] In this article, an analysis and synthesis of software security best practices present in widely recognized security models is performed. Commonalities and variations in the best practices proposed for different phases of secure software development according to these models are identified.…”
Section: N Article Citementioning
confidence: 99%
“…They also demonstrated why it is not the only security measures that must be implemented. Alenezi et al [14] synthesized security best practices presented by security models for linear and agile development lifecycles. This synthesis is geared toward providing a single unified source of knowledge about security best practices for software engineers.…”
Section: Related Workmentioning
confidence: 99%
“…It is made available through the MediaWiki platform to assist practitioners in defending against security attacks and dealing with security errors in an appropriate manner. White [14] identified the need for a holistic approach to IoT security and identified causes for IoT insecurity such as secure SDLC adoption (including SDPs,), organizational/human psychology, and security challenges due to the nature of IoT.…”
Section: Related Workmentioning
confidence: 99%