Preview

Secure Sdlc

Powerful Essays
Open Document
Open Document
1102 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secure Sdlc
International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013 ISSN 2250-3153

1

Software Development Life Cycle Processes with Secure
Ashok Kumar Gottipalla, N.M.S.Desai, M.Sudhakar Reddy
Uppal Hyderabad Ranga Reddy (Dt) Pin code: 500039

Abstract- It is to be to present the information about existing processes, standards, life cycle models, frameworks, and methodologies that support or could support secure software development. This includes software engineering process group (SEPG) members, software developers, and managers seeing information about existing software development life cycle (SDLC) processes that address security. Index Terms- SDLC processes, security Risk Identification, security engineering activities.

engineering), but do not generally provide operational guidance for performing the work. In other words, they don‟t define processes, they define process characteristics; they define the what, but not the how: “CMM-based evaluations are not meant to replace product evaluation or system certification. Rather, organizational evaluations are meant to focus process improvement efforts on weaknesses identified in particular process areas” Capability Maturity Model Integration (CMMI) The Capability Maturity Model Integration (CMMI) framework helps organizations increase the maturity of their processes to improve long-term business performance. The CMMI provides the latest best practices for product and service development, maintenance, and acquisition, including mechanisms to help organizations improve their processes and provides criteria for evaluating process capability and process maturity. Improvement areas covered by this model include systems engineering, software engineering, integrated product and process development, supplier sourcing, and acquisition. The CMMI has been in use for more than three years and will eventually replace its predecessor, the Capability Maturity Model for Software (SW-CMM),



References: [1] [2] The Agile Alliance. Manifesto for Agile Software Development. http://agilemanifesto.org (2001). Beznosov, Konstantin. eXtreme Security Engineering: On Employing XP Practices to Achieve „Good Enough Security‟ without Defining It. http://konstantin.beznosov.net/professional/papers /eXtreme_Security_Engineering.html (2003). Beznosov, Konstantin & Kruchten, Philippe. Towards Agile Security Assurance. http://konstantin.beznosov.net/professional/papers /Towards_Agile_Security_Assurance.html (2004). [3] www.ijsrp.org

You May Also Find These Documents Helpful

  • Better Essays

    Gartenberg, M. (2005, January 13). How to develop an enterprise security policy. Retrieved from http://www.computerworld.com/article/2569303/security0/how-to-develop-an-enterprise-security-policy.html…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    What exactly is SDLC? SDLC stands for Software Development Life Cycle. SDLC is a series of phases that provide model for the development and lifecycle management of an application and/or software. Within SDLC, security should also be considered. How is the application going to be secured? Are we using these phases to the best of our knowledge and incorporating as much security as possible? There are six phases within SDLC. They are Systems analysis, design, implementation, testing, acceptance and deployment, and maintenance. There are four ways to secure SDLC. They are Governance, Construction, Verification, and Deployment. Within each way to secure SDLC, Governance there is strategy and metrics, policy and compliance, education and guidance, threat assessment, security requirements, security architecture, design review, code review, security testing, vulnerability management, hardening environments, and operations.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final Project

    • 2980 Words
    • 18 Pages

    Understand the life cycle of software development and how security can fit into the model.…

    • 2980 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The purpose of this document is to provide a guide to the Capability Maturity Model Integration for Acquisition (CMMI-ACQ) and the guidebook on using the Capability Maturity Model Integration for Development (CMMI-DEV) in IT system and service acquisition projects. It will provide some general background on CMMI and the rationale behind the models, discuss the structure of the CMMI models, and provide more detailed guidelines on how to read the CMMI-ACQ document and the guidebook on using CMMI-DEV for acquisition. This is a high level document that is intended merely as a guide. It provides pointers to the relevant literature and material, but does not discuss the material in depth. In other words, it cannot, and is not intended to, substitute for the actual material itself. The document relies heavily on the CMMI-ACQ document and quotes extensively from it. Unless otherwise indicated, each phrase or sentence in quotation marks is taken from the CMMI-ACQ document.…

    • 4806 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Training Need Analysis

    • 2572 Words
    • 11 Pages

    European Journal of Scientific Research ISSN 1450-216X Vol.37 No.3 (2009), pp.351-360 © EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm…

    • 2572 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, A comparative study of changing Family Composition, Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City Structure and Practices in urban area of Kanpur City (U.P.) (U.P.)…

    • 3733 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Capacity Planning Model

    • 11415 Words
    • 46 Pages

    Received 29 October 2003; revised 24 August 2005; accepted 30 September 2005 DOI 10.1002/nav.20128 Published online 12 December 2005 in Wiley InterScience (www.interscience.wiley.com).…

    • 11415 Words
    • 46 Pages
    Powerful Essays
  • Powerful Essays

    Life Cycle Model

    • 930 Words
    • 4 Pages

    software product. There are many software processes, some fundamental activities are common to all software processes: Software Specification Software design and Implementation Software Validation Software evolution.…

    • 930 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Consumer Preference

    • 4294 Words
    • 18 Pages

    American Journal of Scientific Research ISSN 2301-2005 Issue 79 October, 2012, pp.40-47 © EuroJournals Publishing, Inc. 2012 http://www.eurojournals.com/ajsr.htm…

    • 4294 Words
    • 18 Pages
    Good Essays