Security risks of global software development life cycle: Industry practitioner's perspective

被引:4
|
作者
Khan, Rafiq Ahmad [1 ]
Khan, Siffat Ullah [1 ]
Akbar, Muhammad Azeem [2 ]
Alzahrani, Musaad [3 ]
机构
[1] Univ Malakand, Dept Comp Sci & IT, Software Engn Res Grp, Malakand, Pakistan
[2] LUT Univ, Dept Software Engn, Lappeenranta, Finland
[3] Albaha Univ, Dept Comp Sci, Albaha, Saudi Arabia
关键词
fuzzy analytical hierarchy process (FAHP); secure software engineering; security risks; software development life cycle (SDLC); software security; DECISION-MAKING TAXONOMY; HIERARCHY PROCESS AHP; MATURITY MODEL; FUZZY AHP; DEVELOPMENT METHODOLOGY; CUSTOMER REQUIREMENTS; IMPORTANCE WEIGHTS; SUCCESS FACTORS; PRIORITIZATION; IDENTIFICATION;
D O I
10.1002/smr.2521
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security has become increasingly important because the malicious attack and other hacker risks of a computer system have grown popularity in the last few years. As a result, several researchers have examined security solutions as early as the requirement engineering phase. With the growth of the software business and the internet, there is a need to understand the security risks against each phase of the software development life cycle (SDLC). This study aims to empirically investigate and prioritize the risks that could negatively impact the software security aspects of SDLC in the context of global software development (GSD). To achieve the study objectives, we conducted an industrial empirical study to determine the impact of software security threats against each phase of SDLC. Furthermore, the fuzzy analytical hierarchy process (FAHP) was used to prioritize the list of software security risks against the SDLC. The results and analysis of this study provide a ranked-based decision-making framework, which assists the practitioners in considering the most critical security risks on priority. The results show "improper plan for secure requirement identification, inception, authentication, authorization, and privacy," "lack of threat models updating," "lack of output validation," "lack of certification in the final release and archive," and "spoofing" as the top-ranked security risks of SDLC in GSD. In addition, the application of FAHP is novel in this domain as it is helpful to address multicriteria decision-making problems.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Catalog of metrics for assessing security risks of software throughout the software development life cycle
    Sultan, Khalid
    En-Nouaary, Abdeslam
    Hanaou-Lhadj, Abdelwahab
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 461 - 465
  • [2] Security risks: Management and mitigation in the software life cycle
    Gilliam, DP
    THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 211 - 216
  • [3] Software Development Life Cycle Security Issues
    Kaur, Daljit
    Kaur, Parminder
    2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
  • [4] Embedding Security in Software Development Life Cycle (SDLC)
    Khari, Manju
    Vaishali
    Kumar, Prabhat
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2182 - 2186
  • [5] Reframing Security in Contemporary Software Development Life Cycle
    Frijns, Pieter
    Bierwolf, Robert
    Zijderhand, Tom
    2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 230 - 236
  • [6] Software Process for Dynamic Website Development: Practitioner's Perspective
    Yahaya, Jamaiah H.
    Deraman, Aziz
    Ibrahim, Azhar Abdulridha
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 1470 - 1474
  • [7] Security in the software life cycle
    Department of Homeland Security
    不详
    不详
    不详
    CrossTalk, 2006, 9 (4-9):
  • [8] A common product life cycle in global software development
    De Man, J
    Ebert, C
    ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS, 2004, : 16 - 21
  • [9] A SWOT Analysis of Software Development Life Cycle Security Metrics
    Khalid, Ayesha
    Raza, Mushtaq
    Afsar, Palwasha
    Khan, Rafiq Ahmad
    Mohmand, Muhammad Ismail
    Rahman, Hanif Ur
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2025, 37 (01)
  • [10] Software security checklist for the software life cycle
    Gilliam, DP
    Wolfe, TL
    Sherif, JS
    Bishop, M
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 243 - 248