The SECURE IDENTIFICATION ON THE DESIGN AND IMPLEMENTATION OFSECURE NETWORK PROTOCOL

Main Article Content

Padala Kavitha,Dr.Vijay Pal Singh

Abstract

Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and extensibility.
Securing software is usually considered as a post development activity and not much importance is given to it during
the development of software. However the amount of loss that organizations have incurred over the years due to
security flaws in software has invited researchers to find out better ways of securing software. In the light of
research done by many researchers, this thesis presents how software can be secured by considering security in
different phases of software development life cycle. A number of security activities have been identified that are
needed to build secure software and it is shown that how these security activities are related with the software
development activities of the software development lifecycle. Secure software development processes are critical
part of designing secure software. However, it is hard for the various stakeholders to make the decision about which
software development process to choose without a comparison between them. Even further, after choosing the
process, stakeholders have to decide which methods and techniques to use to fulfill activities required to develop
secure software development processes. This is a problem, because there are a number of methods a stakeholder
could use to fulfill these activities, but no explicit links between a method and development process.

Article Details

Section
Articles