Secure Software Development: Issues and Challenges

In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ping, Sam Wen, Wah, Jeffrey Cheok Jun, Jie, Lee Wen, Han, Jeremy Bong Yong, Muzafar, Saira
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Ping, Sam Wen
Wah, Jeffrey Cheok Jun
Jie, Lee Wen
Han, Jeremy Bong Yong
Muzafar, Saira
description In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.
doi_str_mv 10.48550/arxiv.2311.11021
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2311_11021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2311_11021</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-ed5eda84cb0b42849f4abd9e7f861f9f8d84ae91e5ef252369517cb725a8e013</originalsourceid><addsrcrecordid>eNotzs2OgjAUhuFuZjHBuYBZyQ2APaWF1t0ER8fExAXuyYGeqgkCof7evT_j6ntXXx7GvoHHUivFJzhc9-dYJAAxABfwyURB9WmgsOjc8YKPmNGZmq4_UHuchkvvT-RDbG2Y77BpqN2SH7EPh42nr_cGrJj_bvK_aLVeLPOfVYRpBhFZRRa1rCteSaGlcRIrayhzOgVnnLZaIhkgRU4okaRGQVZXmVCoiUMSsPH_68tc9sP-gMOtfNrLlz25A6CaPow</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Secure Software Development: Issues and Challenges</title><source>arXiv.org</source><creator>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</creator><creatorcontrib>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</creatorcontrib><description>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</description><identifier>DOI: 10.48550/arxiv.2311.11021</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Software Engineering</subject><creationdate>2023-11</creationdate><rights>http://creativecommons.org/licenses/by-nc-sa/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2311.11021$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2311.11021$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Ping, Sam Wen</creatorcontrib><creatorcontrib>Wah, Jeffrey Cheok Jun</creatorcontrib><creatorcontrib>Jie, Lee Wen</creatorcontrib><creatorcontrib>Han, Jeremy Bong Yong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><title>Secure Software Development: Issues and Challenges</title><description>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Software Engineering</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzs2OgjAUhuFuZjHBuYBZyQ2APaWF1t0ER8fExAXuyYGeqgkCof7evT_j6ntXXx7GvoHHUivFJzhc9-dYJAAxABfwyURB9WmgsOjc8YKPmNGZmq4_UHuchkvvT-RDbG2Y77BpqN2SH7EPh42nr_cGrJj_bvK_aLVeLPOfVYRpBhFZRRa1rCteSaGlcRIrayhzOgVnnLZaIhkgRU4okaRGQVZXmVCoiUMSsPH_68tc9sP-gMOtfNrLlz25A6CaPow</recordid><startdate>20231118</startdate><enddate>20231118</enddate><creator>Ping, Sam Wen</creator><creator>Wah, Jeffrey Cheok Jun</creator><creator>Jie, Lee Wen</creator><creator>Han, Jeremy Bong Yong</creator><creator>Muzafar, Saira</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20231118</creationdate><title>Secure Software Development: Issues and Challenges</title><author>Ping, Sam Wen ; Wah, Jeffrey Cheok Jun ; Jie, Lee Wen ; Han, Jeremy Bong Yong ; Muzafar, Saira</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-ed5eda84cb0b42849f4abd9e7f861f9f8d84ae91e5ef252369517cb725a8e013</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Software Engineering</topic><toplevel>online_resources</toplevel><creatorcontrib>Ping, Sam Wen</creatorcontrib><creatorcontrib>Wah, Jeffrey Cheok Jun</creatorcontrib><creatorcontrib>Jie, Lee Wen</creatorcontrib><creatorcontrib>Han, Jeremy Bong Yong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ping, Sam Wen</au><au>Wah, Jeffrey Cheok Jun</au><au>Jie, Lee Wen</au><au>Han, Jeremy Bong Yong</au><au>Muzafar, Saira</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Software Development: Issues and Challenges</atitle><date>2023-11-18</date><risdate>2023</risdate><abstract>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</abstract><doi>10.48550/arxiv.2311.11021</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2311.11021
ispartof
issn
language eng
recordid cdi_arxiv_primary_2311_11021
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Software Engineering
title Secure Software Development: Issues and Challenges
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T14%3A18%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Software%20Development:%20Issues%20and%20Challenges&rft.au=Ping,%20Sam%20Wen&rft.date=2023-11-18&rft_id=info:doi/10.48550/arxiv.2311.11021&rft_dat=%3Carxiv_GOX%3E2311_11021%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true