Security risks of global software development life cycle: Industry practitioner's perspective

被引:4
|
作者
Khan, Rafiq Ahmad [1 ]
Khan, Siffat Ullah [1 ]
Akbar, Muhammad Azeem [2 ]
Alzahrani, Musaad [3 ]
机构
[1] Univ Malakand, Dept Comp Sci & IT, Software Engn Res Grp, Malakand, Pakistan
[2] LUT Univ, Dept Software Engn, Lappeenranta, Finland
[3] Albaha Univ, Dept Comp Sci, Albaha, Saudi Arabia
关键词
fuzzy analytical hierarchy process (FAHP); secure software engineering; security risks; software development life cycle (SDLC); software security; DECISION-MAKING TAXONOMY; HIERARCHY PROCESS AHP; MATURITY MODEL; FUZZY AHP; DEVELOPMENT METHODOLOGY; CUSTOMER REQUIREMENTS; IMPORTANCE WEIGHTS; SUCCESS FACTORS; PRIORITIZATION; IDENTIFICATION;
D O I
10.1002/smr.2521
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security has become increasingly important because the malicious attack and other hacker risks of a computer system have grown popularity in the last few years. As a result, several researchers have examined security solutions as early as the requirement engineering phase. With the growth of the software business and the internet, there is a need to understand the security risks against each phase of the software development life cycle (SDLC). This study aims to empirically investigate and prioritize the risks that could negatively impact the software security aspects of SDLC in the context of global software development (GSD). To achieve the study objectives, we conducted an industrial empirical study to determine the impact of software security threats against each phase of SDLC. Furthermore, the fuzzy analytical hierarchy process (FAHP) was used to prioritize the list of software security risks against the SDLC. The results and analysis of this study provide a ranked-based decision-making framework, which assists the practitioners in considering the most critical security risks on priority. The results show "improper plan for secure requirement identification, inception, authentication, authorization, and privacy," "lack of threat models updating," "lack of output validation," "lack of certification in the final release and archive," and "spoofing" as the top-ranked security risks of SDLC in GSD. In addition, the application of FAHP is novel in this domain as it is helpful to address multicriteria decision-making problems.
引用
收藏
页数:33
相关论文
共 50 条
  • [42] Software Engineer Competencies in Global Software Development: An Indonesian Perspective
    Hidayati, Anita
    Budiardjo, Eko K.
    Purwandari, Betty
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (02): : 683 - 691
  • [43] Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks
    Massacci, Fabio
    Pashchenko, Ivan
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 1386 - 1397
  • [44] Technical leverage in a software ecosystem: Development opportunities and security risks
    University of Trento , Vrije Universiteit Amsterdam , Netherlands
    不详
    Proc Int Conf Software Eng, 1600, (1386-1397):
  • [45] Secure Global Software Development: A Practitioners' Perspective
    Humayun, Mamoona
    Niazi, Mahmood
    Assiri, Mohammed
    Haoues, Mariem
    APPLIED SCIENCES-BASEL, 2023, 13 (04):
  • [46] Security on software life cycle using intrusion detection system
    Myat Myat Min
    Khin Haymar Saw Hla
    APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 360 - 363
  • [47] Software development life cycle model to ensure software quality
    Kececi, N
    Modarres, M
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT (PSAM 4), VOLS 1-4, 1998, : 1104 - 1110
  • [48] Survey: Security in the system development life cycle
    Amer, SH
    Humphries, JW
    Hamilton, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 310 - 316
  • [49] An Information Security Policy Development Life Cycle
    Tuyikeze, T.
    Pottas, D.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
  • [50] The life-cycle approach to software development
    Pilkington, R
    MANUFACTURING CHEMIST, 1996, 67 (01): : 28 - &