Security risks of global software development life cycle: Industry practitioner's perspective

被引:4
|
作者
Khan, Rafiq Ahmad [1 ]
Khan, Siffat Ullah [1 ]
Akbar, Muhammad Azeem [2 ]
Alzahrani, Musaad [3 ]
机构
[1] Univ Malakand, Dept Comp Sci & IT, Software Engn Res Grp, Malakand, Pakistan
[2] LUT Univ, Dept Software Engn, Lappeenranta, Finland
[3] Albaha Univ, Dept Comp Sci, Albaha, Saudi Arabia
关键词
fuzzy analytical hierarchy process (FAHP); secure software engineering; security risks; software development life cycle (SDLC); software security; DECISION-MAKING TAXONOMY; HIERARCHY PROCESS AHP; MATURITY MODEL; FUZZY AHP; DEVELOPMENT METHODOLOGY; CUSTOMER REQUIREMENTS; IMPORTANCE WEIGHTS; SUCCESS FACTORS; PRIORITIZATION; IDENTIFICATION;
D O I
10.1002/smr.2521
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security has become increasingly important because the malicious attack and other hacker risks of a computer system have grown popularity in the last few years. As a result, several researchers have examined security solutions as early as the requirement engineering phase. With the growth of the software business and the internet, there is a need to understand the security risks against each phase of the software development life cycle (SDLC). This study aims to empirically investigate and prioritize the risks that could negatively impact the software security aspects of SDLC in the context of global software development (GSD). To achieve the study objectives, we conducted an industrial empirical study to determine the impact of software security threats against each phase of SDLC. Furthermore, the fuzzy analytical hierarchy process (FAHP) was used to prioritize the list of software security risks against the SDLC. The results and analysis of this study provide a ranked-based decision-making framework, which assists the practitioners in considering the most critical security risks on priority. The results show "improper plan for secure requirement identification, inception, authentication, authorization, and privacy," "lack of threat models updating," "lack of output validation," "lack of certification in the final release and archive," and "spoofing" as the top-ranked security risks of SDLC in GSD. In addition, the application of FAHP is novel in this domain as it is helpful to address multicriteria decision-making problems.
引用
收藏
页数:33
相关论文
共 50 条
  • [31] Security Assurance Model of Software Development for Global Software Development Vendors
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Alzahrani, Musaad
    Ilyas, Muhammad
    IEEE ACCESS, 2022, 10 : 58458 - 58487
  • [32] A neuro-fuzzy security risk assessment system for software development life cycle
    Olusanya, Olayinka Olufunmilayo
    Jimoh, Rasheed Gbenga
    Misra, Sanjay
    Awotunde, Joseph Bamidele
    HELIYON, 2024, 10 (13)
  • [33] Mapping the field of software life cycle security metrics
    Morrison, Patrick
    Moye, David
    Pandita, Rahul
    Williams, Laurie
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 102 : 146 - 159
  • [34] Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
    Kumar, Rajeev
    Khan, Suhel Ahmad
    Khan, Raees Ahmad
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 469 - 478
  • [35] The development of Korea's service industry from a global historical perspective
    Phan, Thanh Hoan
    Jeong, Ji Young
    INTERNATIONAL AREA STUDIES REVIEW, 2013, 16 (02) : 184 - 205
  • [36] Risks and risk mitigation in global software development: An update
    Barros-Justo, Jose L.
    Benitti, Fabiane B., V
    Molleri, Jefferson S.
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2021, 33 (11)
  • [37] Religion and Development: A Practitioner's Perspective on Instrumentalisation
    Balchin, Cassandra
    IDS BULLETIN-INSTITUTE OF DEVELOPMENT STUDIES, 2011, 42 (01): : 15 - 20
  • [38] Cancer and the family life cycle: A practitioner's guide
    Cumming, KT
    GERIATRIC NURSING, 2003, 24 (03) : 169 - 189
  • [39] Estimation of global waste smartphones and embedded critical raw materials: An industry life cycle perspective
    Wang, Fang
    Bu, Haoyue
    Wang, Yanni
    Yu, Lean
    Yin, Xuewei
    RESOURCES CONSERVATION AND RECYCLING, 2023, 196
  • [40] IS security management framework: A comprehensive life cycle perspective
    Warkentin, M
    Schmidt, MB
    Johnston, AC
    Boren, M
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 471 - 474