• English
    • العربية
  • English
  • تسجيل الدخول
  • جامعة قطر
  • مكتبة جامعة قطر
  •  الصفحة الرئيسية
  • الوحدات والمجموعات
  • حقوق النشر
عرض التسجيلة 
  •   مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • كلية الإدارة والاقتصاد
  • المحاسبة ونظم المعلومات
  • عرض التسجيلة
  • مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • كلية الإدارة والاقتصاد
  • المحاسبة ونظم المعلومات
  • عرض التسجيلة
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Systematic Literature Review on Security Risks and its Practices in Secure Software Development

    Thumbnail
    عرض / فتح
    Systematic_Literature_Review_on_Security_Risks_and_its_Practices_in_Secure_Software_Development.pdf (14.48Mb)
    التاريخ
    2022-01-05
    المؤلف
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Khan, Habib Ullah
    Ilyas, Muhammad
    البيانات الوصفية
    عرض كامل للتسجيلة
    الملخص
    Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, and services. Software development organizations treat security as an afterthought issue, and as a result, they continue to face security threats. Incorporating security at any level of the Software Development Life Cycle (SDLC) has become an urgent requirement. Several methodologies, strategies, and models have been proposed and developed to address software security, but only a few of them give reliable evidence for creating secure software applications. Software security issues, on the other hand, have not been adequately addressed, and integrating security procedures into the SDLC remains a challenge. The major purpose of this paper is to learn about software security risks and practices so that secure software development methods can be better designed. A systematic literature review (SLR) was performed to classify important studies to achieve this goal. Based on the inclusion, exclusion, and quality assessment criteria, a total of 121 studies were chosen. This study identified 145 security risks and 424 best practices that help software development organizations to manage the security in each phase of the SDLC. To pursue secure SDLC, this study prescribed different security activities, which should be followed in each phase of the SDLC. Successful integration of these activities minimizing effort, time, and budget while delivering secure software applications. The findings of this study assist software development organizations in improving the security level of their software products and also enhancing their security efficiency. This will raise the developer's awareness of secure development practices as well.
    معرّف المصادر الموحد
    https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85122573397&origin=inward
    DOI/handle
    http://dx.doi.org/10.1109/ACCESS.2022.3140181
    http://hdl.handle.net/10576/37600
    المجموعات
    • المحاسبة ونظم المعلومات [‎578‎ items ]

    entitlement

    وثائق ذات صلة

    عرض الوثائق المتصلة بواسطة: العنوان، المؤلف، المنشئ والموضوع.

    • Thumbnail

      The 6th Annual Conference 2021 (Day1) 

      Aras, Bulent; Baabood, Abdullah; Dehghani, Hamid Reza; Abbasi, Fahimeh; Haghirian, Mehran; ... more authors ( Gulf Studies center - College of Arts & Sciences - Qatar University , 2021 , Video)
      Session 1: Frameworks and Approaches to the Regional Security System in the Gulf - Session 2: Non-Conventional Security Aspects in the Gulf: Towards a Comprehensive Security - Session 3: Roles and Policies of the GCC States ...
    • Thumbnail

      The 6th Annual Conference 2021 (Day2) 

      Parmeter, Ian; Bukhari, Asiya; Owen Jones, Marc; Bijan, Aref; Ghurab, Salem; ... more authors ( Gulf Studies center - College of Arts & Sciences - Qatar University , 2021 , Video)
      Session 4: Cyber Security in the Gulf - Session 5: External Actors and Case Studies
    • Thumbnail

      Information security policy compliance: a higher education case study 

      Alshare, Khaled A.; Lane, Peggy L.; Lane, Michael R. ( Emerald Publishing , 2018 , Article)
      Purpose: The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence ...

    مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

    اتصل بنا
    اتصل بنا | جامعة قطر

     

     

    الصفحة الرئيسية

    أرسل عملك التابع لجامعة قطر

    تصفح

    محتويات مركز المجموعات الرقمية
      الوحدات والمجموعات تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر
    هذه المجموعة
      تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر

    حسابي

    تسجيل الدخول

    إحصائيات

    عرض إحصائيات الاستخدام

    مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

    اتصل بنا
    اتصل بنا | جامعة قطر

     

     

    Video