Open Access iconOpen Access

ARTICLE

crossmark

Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

by Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

1 Department of Information Systems, College of Computer and Information Sciences, Jouf University, Al-Jouf, KSA
2 School of Computer Science and Engineering (SCE), Taylor's University, Selangor, Malaysia
3 Department of Computer Science, Bahria University, Islamabad, Pakistan

* Corresponding Author: NZ Jhanjhi. Email: email

Computers, Materials & Continua 2022, 71(3), 5039-5059. https://doi.org/10.32604/cmc.2022.019289

Abstract

Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and penetrate” strategy, in which security is accessed once the job is completed. Increased cost, time overrun, not integrating testing and input in SDLC, usage of third-party tools and components, and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC, despite the fact that secure software development is essential for business continuity and survival in today's ICT world. There is a need to implement best practices in SDLC to address security at all levels. To fill this gap, we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines. We proposed a secure SDLC framework based on the identified practices, which integrates the best security practices in various SDLC phases. A mathematical model is used to validate the proposed framework. A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC, resulting in more secure applications.

Keywords


Cite This Article

APA Style
Humayun, M., Jhanjhi, N., Almufareh, M.F., Khalil, M.I. (2022). Security threat and vulnerability assessment and measurement in secure software development. Computers, Materials & Continua, 71(3), 5039-5059. https://doi.org/10.32604/cmc.2022.019289
Vancouver Style
Humayun M, Jhanjhi N, Almufareh MF, Khalil MI. Security threat and vulnerability assessment and measurement in secure software development. Comput Mater Contin. 2022;71(3):5039-5059 https://doi.org/10.32604/cmc.2022.019289
IEEE Style
M. Humayun, N. Jhanjhi, M. F. Almufareh, and M. I. Khalil, “Security Threat and Vulnerability Assessment and Measurement in Secure Software Development,” Comput. Mater. Contin., vol. 71, no. 3, pp. 5039-5059, 2022. https://doi.org/10.32604/cmc.2022.019289



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2975

    View

  • 2065

    Download

  • 1

    Like

Share Link