Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Impact of Security assessment for more secure software – A Tactics and Multi-Dimensional Perspective

View through CrossRef
Abstract Security assessments are one of the most impactful points for developing more secure software that provides identification of security vulnerabilities, finding risks, and threats effective and strongest defense against them. The quality of the security system can be possible maximized through the prioritization of every aspect of the software system and the execution of a thorough standard security assessment. In this paper, we proposed a secure flow of software security requirements, Security pattern framework, and Threat and Risk assessment. The framework provides a secure flow of software security systems to detect attack patterns, block, response, and recovery through a systematic analysis. We implement prioritization and specification of security aspects in consideration of security requirements. Tactics and multidimensional perspective to provide appropriate solutions by unifying all components of the security function and all related issues. Security goals aim to mitigate risks and protect from threats, which is done through an appropriate risk and threat assessment model. In addition, we show an integrated threat model which specifies security and mitigates threat and risk. The results of this study will help the software development cycle to develop more secure software and increase the effectiveness of the software security system.
Title: Impact of Security assessment for more secure software – A Tactics and Multi-Dimensional Perspective
Description:
Abstract Security assessments are one of the most impactful points for developing more secure software that provides identification of security vulnerabilities, finding risks, and threats effective and strongest defense against them.
The quality of the security system can be possible maximized through the prioritization of every aspect of the software system and the execution of a thorough standard security assessment.
In this paper, we proposed a secure flow of software security requirements, Security pattern framework, and Threat and Risk assessment.
The framework provides a secure flow of software security systems to detect attack patterns, block, response, and recovery through a systematic analysis.
We implement prioritization and specification of security aspects in consideration of security requirements.
Tactics and multidimensional perspective to provide appropriate solutions by unifying all components of the security function and all related issues.
Security goals aim to mitigate risks and protect from threats, which is done through an appropriate risk and threat assessment model.
In addition, we show an integrated threat model which specifies security and mitigates threat and risk.
The results of this study will help the software development cycle to develop more secure software and increase the effectiveness of the software security system.

Related Results

TAKTIK RETORIS NAJWA SHIHAB PADA PROGRAM TALK SHOW MATA NAJWA DI METRO TV
TAKTIK RETORIS NAJWA SHIHAB PADA PROGRAM TALK SHOW MATA NAJWA DI METRO TV
The research aims to describe the rhetorical tactics used by Najwa Shihab on the Mata Najwa talk show program that aired on one of Indonesia’s private television stations, Metro TV...
A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection
A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection
Purpose: This paper proposes a Secure Unified Data Model (UDM) Approach that enhances data security, trust, and reliability in Cyber-Physical Systems (CPS) by addressing data secur...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
INFORMATION SYSTEM SECURITY (CYBER SECURITY)
INFORMATION SYSTEM SECURITY (CYBER SECURITY)
Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointm...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
Do Vehicles Need Data Security?
Do Vehicles Need Data Security?
<div class="section abstract"><div class="htmlview paragraph">Data security was introduced to vehicles in the 1980's with the electronic theft protection system. Since ...
Software Assurance
Software Assurance
Abstract Confidence in software quality is a rare commodity throughout all industries. Software publishers, users, and system integrators are highly distrustful of anyone...

Back to Top