18
views
0
recommends
+1 Recommend
0 collections
    2
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Software Security Rules, SDLC Perspective

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

          Related collections

          Author and article information

          Journal
          02 November 2009
          Article
          0911.0494
          1fd1560f-b796-4d7d-b245-5fb931d95888

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          ISSN 1947 5500
          International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 123-128, October 2009, USA
          6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
          cs.SE cs.CR

          Comments

          Comment on this article