Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utm...
Gespeichert in:
Veröffentlicht in: | Computers, materials & continua materials & continua, 2021-01, Vol.66 (2), p.1849-1865 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1865 |
---|---|
container_issue | 2 |
container_start_page | 1849 |
container_title | Computers, materials & continua |
container_volume | 66 |
creator | Attaallah, Abdulaziz Algarni, Abdullah Ahmad Khan, Raees |
description | The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utmost significance. In order to handle the cyber-security risk of the web application and protect individuals, information and properties effectively, one must consider what needs to be secured, what are the perceived threats and the protection of assets. Security preparation plans, implements, tracks, updates and consistently develops safety risk management activities. Risk management must be interpreted as the major component for tackling security efficiently. In particular, during application development, security is considered as an add-on but not the main issue. It is important for the researchers to stress on the consideration of protection right from the earlier developmental stages of the software. This approach will help in designing software which can itself combat threats and does not depend on external security programs. Therefore, it is essential to evaluate the impact of security risks during software design. In this paper the researchers have used the hybrid Fuzzy AHP-TOPSIS method to evaluate the risks for improving security durability of different Institutional Web Applications. In addition, the e-component of security risk is measured on software durability, and vice versa. The paper’s findings will prove to be valuable for enhancing the security durability of different web applications. |
doi_str_mv | 10.32604/cmc.2020.013854 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2465894918</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2465894918</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-e42da84266ef3277fdcd6ad661c9aedc4c4844a65703b35db7dc3d233f0c71673</originalsourceid><addsrcrecordid>eNpVkElPwzAQhS0EEqVw52iJc4q3OAm3qmWpVARiEUfL8VK5pHGwnUr996SUA5zmaebp6c0HwCVGE0o4YtdqoyYEETRBmJY5OwIjnDOeEUL48R99Cs5iXCNEOa3QCPhH2cqVa1fw1ag-uLTLXlz8jND6ABebLvjtv-O8D7J2zSCht3DRxuRSn5xvZQM_TJ1Nu65xSu438QbOTXSrFj6bEDujktuac3BiZRPNxe8cg_e727fZQ7Z8ul_MpstMUUxTZhjRsmSEc2MpKQqrleZSc45VJY1WTLGSMcnzAtGa5routKKaUGqRKjAv6BhcHXKHD756E5NY-z4MLaMgjOdlxSpcDi50cKngYwzGii64jQw7gZH4wSoGrGKPVRyw0m9WS21X</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2465894918</pqid></control><display><type>article</type><title>Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Attaallah, Abdulaziz ; Algarni, Abdullah ; Ahmad Khan, Raees</creator><creatorcontrib>Attaallah, Abdulaziz ; Algarni, Abdullah ; Ahmad Khan, Raees</creatorcontrib><description>The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utmost significance. In order to handle the cyber-security risk of the web application and protect individuals, information and properties effectively, one must consider what needs to be secured, what are the perceived threats and the protection of assets. Security preparation plans, implements, tracks, updates and consistently develops safety risk management activities. Risk management must be interpreted as the major component for tackling security efficiently. In particular, during application development, security is considered as an add-on but not the main issue. It is important for the researchers to stress on the consideration of protection right from the earlier developmental stages of the software. This approach will help in designing software which can itself combat threats and does not depend on external security programs. Therefore, it is essential to evaluate the impact of security risks during software design. In this paper the researchers have used the hybrid Fuzzy AHP-TOPSIS method to evaluate the risks for improving security durability of different Institutional Web Applications. In addition, the e-component of security risk is measured on software durability, and vice versa. The paper’s findings will prove to be valuable for enhancing the security durability of different web applications.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2020.013854</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Applications programs ; Cybersecurity ; Durability ; Evaluation ; Risk management ; Safety management ; Software ; Software development</subject><ispartof>Computers, materials & continua, 2021-01, Vol.66 (2), p.1849-1865</ispartof><rights>2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-e42da84266ef3277fdcd6ad661c9aedc4c4844a65703b35db7dc3d233f0c71673</citedby><cites>FETCH-LOGICAL-c313t-e42da84266ef3277fdcd6ad661c9aedc4c4844a65703b35db7dc3d233f0c71673</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Attaallah, Abdulaziz</creatorcontrib><creatorcontrib>Algarni, Abdullah</creatorcontrib><creatorcontrib>Ahmad Khan, Raees</creatorcontrib><title>Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective</title><title>Computers, materials & continua</title><description>The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utmost significance. In order to handle the cyber-security risk of the web application and protect individuals, information and properties effectively, one must consider what needs to be secured, what are the perceived threats and the protection of assets. Security preparation plans, implements, tracks, updates and consistently develops safety risk management activities. Risk management must be interpreted as the major component for tackling security efficiently. In particular, during application development, security is considered as an add-on but not the main issue. It is important for the researchers to stress on the consideration of protection right from the earlier developmental stages of the software. This approach will help in designing software which can itself combat threats and does not depend on external security programs. Therefore, it is essential to evaluate the impact of security risks during software design. In this paper the researchers have used the hybrid Fuzzy AHP-TOPSIS method to evaluate the risks for improving security durability of different Institutional Web Applications. In addition, the e-component of security risk is measured on software durability, and vice versa. The paper’s findings will prove to be valuable for enhancing the security durability of different web applications.</description><subject>Applications programs</subject><subject>Cybersecurity</subject><subject>Durability</subject><subject>Evaluation</subject><subject>Risk management</subject><subject>Safety management</subject><subject>Software</subject><subject>Software development</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpVkElPwzAQhS0EEqVw52iJc4q3OAm3qmWpVARiEUfL8VK5pHGwnUr996SUA5zmaebp6c0HwCVGE0o4YtdqoyYEETRBmJY5OwIjnDOeEUL48R99Cs5iXCNEOa3QCPhH2cqVa1fw1ag-uLTLXlz8jND6ABebLvjtv-O8D7J2zSCht3DRxuRSn5xvZQM_TJ1Nu65xSu438QbOTXSrFj6bEDujktuac3BiZRPNxe8cg_e727fZQ7Z8ul_MpstMUUxTZhjRsmSEc2MpKQqrleZSc45VJY1WTLGSMcnzAtGa5routKKaUGqRKjAv6BhcHXKHD756E5NY-z4MLaMgjOdlxSpcDi50cKngYwzGii64jQw7gZH4wSoGrGKPVRyw0m9WS21X</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Attaallah, Abdulaziz</creator><creator>Algarni, Abdullah</creator><creator>Ahmad Khan, Raees</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20210101</creationdate><title>Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective</title><author>Attaallah, Abdulaziz ; Algarni, Abdullah ; Ahmad Khan, Raees</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-e42da84266ef3277fdcd6ad661c9aedc4c4844a65703b35db7dc3d233f0c71673</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Applications programs</topic><topic>Cybersecurity</topic><topic>Durability</topic><topic>Evaluation</topic><topic>Risk management</topic><topic>Safety management</topic><topic>Software</topic><topic>Software development</topic><toplevel>online_resources</toplevel><creatorcontrib>Attaallah, Abdulaziz</creatorcontrib><creatorcontrib>Algarni, Abdullah</creatorcontrib><creatorcontrib>Ahmad Khan, Raees</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials & continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Attaallah, Abdulaziz</au><au>Algarni, Abdullah</au><au>Ahmad Khan, Raees</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective</atitle><jtitle>Computers, materials & continua</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>66</volume><issue>2</issue><spage>1849</spage><epage>1865</epage><pages>1849-1865</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utmost significance. In order to handle the cyber-security risk of the web application and protect individuals, information and properties effectively, one must consider what needs to be secured, what are the perceived threats and the protection of assets. Security preparation plans, implements, tracks, updates and consistently develops safety risk management activities. Risk management must be interpreted as the major component for tackling security efficiently. In particular, during application development, security is considered as an add-on but not the main issue. It is important for the researchers to stress on the consideration of protection right from the earlier developmental stages of the software. This approach will help in designing software which can itself combat threats and does not depend on external security programs. Therefore, it is essential to evaluate the impact of security risks during software design. In this paper the researchers have used the hybrid Fuzzy AHP-TOPSIS method to evaluate the risks for improving security durability of different Institutional Web Applications. In addition, the e-component of security risk is measured on software durability, and vice versa. The paper’s findings will prove to be valuable for enhancing the security durability of different web applications.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2020.013854</doi><tpages>17</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-2226 |
ispartof | Computers, materials & continua, 2021-01, Vol.66 (2), p.1849-1865 |
issn | 1546-2226 1546-2218 1546-2226 |
language | eng |
recordid | cdi_proquest_journals_2465894918 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Applications programs Cybersecurity Durability Evaluation Risk management Safety management Software Software development |
title | Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T12%3A03%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Managing%20Security-Risks%20for%20Improving%20Security-Durability%20of%20Institutional%20Web-Applications:%20Design%20Perspective&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Attaallah,%20Abdulaziz&rft.date=2021-01-01&rft.volume=66&rft.issue=2&rft.spage=1849&rft.epage=1865&rft.pages=1849-1865&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2020.013854&rft_dat=%3Cproquest_cross%3E2465894918%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2465894918&rft_id=info:pmid/&rfr_iscdi=true |