Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern

In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of innovative technology and exploring engineering 2019-11, Vol.9 (1), p.982-991
Hauptverfasser: Kulkarni, Yogini C., Joshi, Prof. Dr. S .D.
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 991
container_issue 1
container_start_page 982
container_title International journal of innovative technology and exploring engineering
container_volume 9
creator Kulkarni, Yogini C.
Joshi, Prof. Dr. S .D.
description In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system
doi_str_mv 10.35940/ijitee.A4580.119119
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijitee_A4580_119119</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijitee_A4580_119119</sourcerecordid><originalsourceid>FETCH-crossref_primary_10_35940_ijitee_A4580_1191193</originalsourceid><addsrcrecordid>eNqdj8FKw0AURYei0KL9gy7eDzTONIlNlrVVulAoVHQ5jOlLeKWdkfcmi-z8DX_PL7GkIq6FC_cu7r1wlJoYnaR5mekb2lNETBZZXujEmPKkgRrNZvNimup5fvEnD9VYZK-1NmlmittypNwWq5YpdvAUdngg30AdGF7xDe6c4A5eSCgG_vr4FHgMDXnYdhLx2Nc2LUvrfIUQavh9WqFQ42HjYkT21-qydgfB8Y9fqezh_nm5nlYcRBhr-850dNxZo21PZM9EtieyZ6L0n7NvOrtZEQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Kulkarni, Yogini C. ; Joshi, Prof. Dr. S .D.</creator><creatorcontrib>Kulkarni, Yogini C. ; Joshi, Prof. Dr. S .D. ; Information Technology Department , Bharati Vidyapeeth (Deemed To Be University) Pune,India ; Computer Engineering Department ‘ Bharati Vidyapeeth (Deemed To Be University) Pune,India</creatorcontrib><description>In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system</description><identifier>ISSN: 2278-3075</identifier><identifier>EISSN: 2278-3075</identifier><identifier>DOI: 10.35940/ijitee.A4580.119119</identifier><language>eng</language><ispartof>International journal of innovative technology and exploring engineering, 2019-11, Vol.9 (1), p.982-991</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Kulkarni, Yogini C.</creatorcontrib><creatorcontrib>Joshi, Prof. Dr. S .D.</creatorcontrib><creatorcontrib>Information Technology Department , Bharati Vidyapeeth (Deemed To Be University) Pune,India</creatorcontrib><creatorcontrib>Computer Engineering Department ‘ Bharati Vidyapeeth (Deemed To Be University) Pune,India</creatorcontrib><title>Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern</title><title>International journal of innovative technology and exploring engineering</title><description>In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system</description><issn>2278-3075</issn><issn>2278-3075</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNqdj8FKw0AURYei0KL9gy7eDzTONIlNlrVVulAoVHQ5jOlLeKWdkfcmi-z8DX_PL7GkIq6FC_cu7r1wlJoYnaR5mekb2lNETBZZXujEmPKkgRrNZvNimup5fvEnD9VYZK-1NmlmittypNwWq5YpdvAUdngg30AdGF7xDe6c4A5eSCgG_vr4FHgMDXnYdhLx2Nc2LUvrfIUQavh9WqFQ42HjYkT21-qydgfB8Y9fqezh_nm5nlYcRBhr-850dNxZo21PZM9EtieyZ6L0n7NvOrtZEQ</recordid><startdate>20191130</startdate><enddate>20191130</enddate><creator>Kulkarni, Yogini C.</creator><creator>Joshi, Prof. Dr. S .D.</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20191130</creationdate><title>Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern</title><author>Kulkarni, Yogini C. ; Joshi, Prof. Dr. S .D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-crossref_primary_10_35940_ijitee_A4580_1191193</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Kulkarni, Yogini C.</creatorcontrib><creatorcontrib>Joshi, Prof. Dr. S .D.</creatorcontrib><creatorcontrib>Information Technology Department , Bharati Vidyapeeth (Deemed To Be University) Pune,India</creatorcontrib><creatorcontrib>Computer Engineering Department ‘ Bharati Vidyapeeth (Deemed To Be University) Pune,India</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of innovative technology and exploring engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kulkarni, Yogini C.</au><au>Joshi, Prof. Dr. S .D.</au><aucorp>Information Technology Department , Bharati Vidyapeeth (Deemed To Be University) Pune,India</aucorp><aucorp>Computer Engineering Department ‘ Bharati Vidyapeeth (Deemed To Be University) Pune,India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern</atitle><jtitle>International journal of innovative technology and exploring engineering</jtitle><date>2019-11-30</date><risdate>2019</risdate><volume>9</volume><issue>1</issue><spage>982</spage><epage>991</epage><pages>982-991</pages><issn>2278-3075</issn><eissn>2278-3075</eissn><abstract>In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system</abstract><doi>10.35940/ijitee.A4580.119119</doi></addata></record>
fulltext fulltext
identifier ISSN: 2278-3075
ispartof International journal of innovative technology and exploring engineering, 2019-11, Vol.9 (1), p.982-991
issn 2278-3075
2278-3075
language eng
recordid cdi_crossref_primary_10_35940_ijitee_A4580_119119
source EZB-FREE-00999 freely available EZB journals
title Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T01%3A59%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Modeling%20for%20Web%20Based%20Visitor%E2%80%99s%20Login%20System%20for%20Pursuance%20of%20Security%20Design%20Pattern&rft.jtitle=International%20journal%20of%20innovative%20technology%20and%20exploring%20engineering&rft.au=Kulkarni,%20Yogini%20C.&rft.aucorp=Information%20Technology%20Department%20,%20Bharati%20Vidyapeeth%20(Deemed%20To%20Be%20University)%20Pune,India&rft.date=2019-11-30&rft.volume=9&rft.issue=1&rft.spage=982&rft.epage=991&rft.pages=982-991&rft.issn=2278-3075&rft.eissn=2278-3075&rft_id=info:doi/10.35940/ijitee.A4580.119119&rft_dat=%3Ccrossref%3E10_35940_ijitee_A4580_119119%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true