Secure Software Development: Issues and Challenges
In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Ping, Sam Wen Wah, Jeffrey Cheok Jun Jie, Lee Wen Han, Jeremy Bong Yong Muzafar, Saira |
description | In recent years, technology has advanced considerably with the introduction
of many systems including advanced robotics, big data analytics, cloud
computing, machine learning and many more. The opportunities to exploit the yet
to come security that comes with these systems are going toe to toe with new
releases of security protocols to combat this exploitation to provide a secure
system. The digitization of our lives proves to solve our human problems as
well as improve quality of life but because it is digitalized, information and
technology could be misused for other malicious gains. Hackers aim to steal the
data of innocent people to use it for other causes such as identity fraud,
scams and many more. This issue can be corrected during the software
development life cycle, integrating security across the development phases, and
testing of the software is done early to reduce the number of vulnerabilities
that might or might not heavily impact an organisation depending on the range
of the attack. The goal of a secured system software is to prevent such
exploitations from ever happening by conducting a system life cycle where
through planning and testing is done to maximise security while maintaining
functionality of the system. In this paper, we are going to discuss the recent
trends in security for system development as well as our predictions and
suggestions to improve the current security practices in this industry. |
doi_str_mv | 10.48550/arxiv.2311.11021 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2311_11021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2311_11021</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-ed5eda84cb0b42849f4abd9e7f861f9f8d84ae91e5ef252369517cb725a8e013</originalsourceid><addsrcrecordid>eNotzs2OgjAUhuFuZjHBuYBZyQ2APaWF1t0ER8fExAXuyYGeqgkCof7evT_j6ntXXx7GvoHHUivFJzhc9-dYJAAxABfwyURB9WmgsOjc8YKPmNGZmq4_UHuchkvvT-RDbG2Y77BpqN2SH7EPh42nr_cGrJj_bvK_aLVeLPOfVYRpBhFZRRa1rCteSaGlcRIrayhzOgVnnLZaIhkgRU4okaRGQVZXmVCoiUMSsPH_68tc9sP-gMOtfNrLlz25A6CaPow</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Secure Software Development: Issues and Challenges</title><source>arXiv.org</source><creator>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</creator><creatorcontrib>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</creatorcontrib><description>In recent years, technology has advanced considerably with the introduction
of many systems including advanced robotics, big data analytics, cloud
computing, machine learning and many more. The opportunities to exploit the yet
to come security that comes with these systems are going toe to toe with new
releases of security protocols to combat this exploitation to provide a secure
system. The digitization of our lives proves to solve our human problems as
well as improve quality of life but because it is digitalized, information and
technology could be misused for other malicious gains. Hackers aim to steal the
data of innocent people to use it for other causes such as identity fraud,
scams and many more. This issue can be corrected during the software
development life cycle, integrating security across the development phases, and
testing of the software is done early to reduce the number of vulnerabilities
that might or might not heavily impact an organisation depending on the range
of the attack. The goal of a secured system software is to prevent such
exploitations from ever happening by conducting a system life cycle where
through planning and testing is done to maximise security while maintaining
functionality of the system. In this paper, we are going to discuss the recent
trends in security for system development as well as our predictions and
suggestions to improve the current security practices in this industry.</description><identifier>DOI: 10.48550/arxiv.2311.11021</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Software Engineering</subject><creationdate>2023-11</creationdate><rights>http://creativecommons.org/licenses/by-nc-sa/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2311.11021$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2311.11021$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Ping, Sam Wen</creatorcontrib><creatorcontrib>Wah, Jeffrey Cheok Jun</creatorcontrib><creatorcontrib>Jie, Lee Wen</creatorcontrib><creatorcontrib>Han, Jeremy Bong Yong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><title>Secure Software Development: Issues and Challenges</title><description>In recent years, technology has advanced considerably with the introduction
of many systems including advanced robotics, big data analytics, cloud
computing, machine learning and many more. The opportunities to exploit the yet
to come security that comes with these systems are going toe to toe with new
releases of security protocols to combat this exploitation to provide a secure
system. The digitization of our lives proves to solve our human problems as
well as improve quality of life but because it is digitalized, information and
technology could be misused for other malicious gains. Hackers aim to steal the
data of innocent people to use it for other causes such as identity fraud,
scams and many more. This issue can be corrected during the software
development life cycle, integrating security across the development phases, and
testing of the software is done early to reduce the number of vulnerabilities
that might or might not heavily impact an organisation depending on the range
of the attack. The goal of a secured system software is to prevent such
exploitations from ever happening by conducting a system life cycle where
through planning and testing is done to maximise security while maintaining
functionality of the system. In this paper, we are going to discuss the recent
trends in security for system development as well as our predictions and
suggestions to improve the current security practices in this industry.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Software Engineering</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzs2OgjAUhuFuZjHBuYBZyQ2APaWF1t0ER8fExAXuyYGeqgkCof7evT_j6ntXXx7GvoHHUivFJzhc9-dYJAAxABfwyURB9WmgsOjc8YKPmNGZmq4_UHuchkvvT-RDbG2Y77BpqN2SH7EPh42nr_cGrJj_bvK_aLVeLPOfVYRpBhFZRRa1rCteSaGlcRIrayhzOgVnnLZaIhkgRU4okaRGQVZXmVCoiUMSsPH_68tc9sP-gMOtfNrLlz25A6CaPow</recordid><startdate>20231118</startdate><enddate>20231118</enddate><creator>Ping, Sam Wen</creator><creator>Wah, Jeffrey Cheok Jun</creator><creator>Jie, Lee Wen</creator><creator>Han, Jeremy Bong Yong</creator><creator>Muzafar, Saira</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20231118</creationdate><title>Secure Software Development: Issues and Challenges</title><author>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-ed5eda84cb0b42849f4abd9e7f861f9f8d84ae91e5ef252369517cb725a8e013</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Software Engineering</topic><toplevel>online_resources</toplevel><creatorcontrib>Ping, Sam Wen</creatorcontrib><creatorcontrib>Wah, Jeffrey Cheok Jun</creatorcontrib><creatorcontrib>Jie, Lee Wen</creatorcontrib><creatorcontrib>Han, Jeremy Bong Yong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ping, Sam Wen</au><au>Wah, Jeffrey Cheok Jun</au><au>Jie, Lee Wen</au><au>Han, Jeremy Bong Yong</au><au>Muzafar, Saira</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Software Development: Issues and Challenges</atitle><date>2023-11-18</date><risdate>2023</risdate><abstract>In recent years, technology has advanced considerably with the introduction
of many systems including advanced robotics, big data analytics, cloud
computing, machine learning and many more. The opportunities to exploit the yet
to come security that comes with these systems are going toe to toe with new
releases of security protocols to combat this exploitation to provide a secure
system. The digitization of our lives proves to solve our human problems as
well as improve quality of life but because it is digitalized, information and
technology could be misused for other malicious gains. Hackers aim to steal the
data of innocent people to use it for other causes such as identity fraud,
scams and many more. This issue can be corrected during the software
development life cycle, integrating security across the development phases, and
testing of the software is done early to reduce the number of vulnerabilities
that might or might not heavily impact an organisation depending on the range
of the attack. The goal of a secured system software is to prevent such
exploitations from ever happening by conducting a system life cycle where
through planning and testing is done to maximise security while maintaining
functionality of the system. In this paper, we are going to discuss the recent
trends in security for system development as well as our predictions and
suggestions to improve the current security practices in this industry.</abstract><doi>10.48550/arxiv.2311.11021</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2311.11021 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2311_11021 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Software Engineering |
title | Secure Software Development: Issues and Challenges |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T14%3A18%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Software%20Development:%20Issues%20and%20Challenges&rft.au=Ping,%20Sam%20Wen&rft.date=2023-11-18&rft_id=info:doi/10.48550/arxiv.2311.11021&rft_dat=%3Carxiv_GOX%3E2311_11021%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |