INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
Every software goes through lifecycle which consist of different stages. For building secure software security aspect has to be kept in mind at each stage. The Objective of the software is to me customer requirements but CIA (confidentiality, Integrity and availability) aspect of the security for software must not be ignored. The Programmer or Developer writes program code to accomplish a particular task. While writing program, developer / programmer don’t consider vulnerabilities in the program which can be helpful to attacker to get into the system and perform malicious activities which can cause DAD (Disclosure, Alteration and Denial) of Data. Software should be in such a way that it should not contain any loopholes. Attackers write malware programs whose task is to find vulnerabilities in genuine program and get into the system and do malicious tasks ranging like spreading into the network, dropping a malicious file in the system, and many more. In this paper, we are proposing how to build secure software lifecycle by including security aspect at every stage.
Keywords:
CIA & DAD triad, Secure SDLC, Code Review
Cite Article:
"Secure Software Development Lifecycle", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.3, Issue 11, page no.291 - 293, December-2018, Available :http://www.ijsdr.org/papers/IJSDR1812049.pdf
Downloads:
000336257
Publication Details:
Published Paper ID: IJSDR1812049
Registration ID:180928
Published In: Volume 3 Issue 11, December-2018
DOI (Digital Object Identifier):
Page No: 291 - 293
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn