Secure Software Development: Issues and Challenges

In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2023-11
Hauptverfasser: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Yong Han, Jeremy Bong, Muzafar, Saira
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Sam Wen Ping
Jeffrey Cheok Jun Wah
Lee Wen Jie
Yong Han, Jeremy Bong
Muzafar, Saira
description In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2894171522</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2894171522</sourcerecordid><originalsourceid>FETCH-proquest_journals_28941715223</originalsourceid><addsrcrecordid>eNpjYuA0MjY21LUwMTLiYOAtLs4yMDAwMjM3MjU15mQwCk5NLi1KVQjOTyspTwQyXFLLUnPyC3JT80qsFDyLi0tTixUS81IUnDMSc3JS89JTi3kYWNMSc4pTeaE0N4Oym2uIs4duQVF-IVB5SXxWfmlRHlAq3sjC0sTQ3NDUyMiYOFUA1J0zvQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2894171522</pqid></control><display><type>article</type><title>Secure Software Development: Issues and Challenges</title><source>Free E- Journals</source><creator>Sam Wen Ping ; Jeffrey Cheok Jun Wah ; Lee Wen Jie ; Yong Han, Jeremy Bong ; Muzafar, Saira</creator><creatorcontrib>Sam Wen Ping ; Jeffrey Cheok Jun Wah ; Lee Wen Jie ; Yong Han, Jeremy Bong ; Muzafar, Saira</creatorcontrib><description>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Big Data ; Cloud computing ; Cybersecurity ; Machine learning ; Robotics ; Software ; Software development</subject><ispartof>arXiv.org, 2023-11</ispartof><rights>2023. This work is published under http://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Sam Wen Ping</creatorcontrib><creatorcontrib>Jeffrey Cheok Jun Wah</creatorcontrib><creatorcontrib>Lee Wen Jie</creatorcontrib><creatorcontrib>Yong Han, Jeremy Bong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><title>Secure Software Development: Issues and Challenges</title><title>arXiv.org</title><description>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</description><subject>Big Data</subject><subject>Cloud computing</subject><subject>Cybersecurity</subject><subject>Machine learning</subject><subject>Robotics</subject><subject>Software</subject><subject>Software development</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpjYuA0MjY21LUwMTLiYOAtLs4yMDAwMjM3MjU15mQwCk5NLi1KVQjOTyspTwQyXFLLUnPyC3JT80qsFDyLi0tTixUS81IUnDMSc3JS89JTi3kYWNMSc4pTeaE0N4Oym2uIs4duQVF-IVB5SXxWfmlRHlAq3sjC0sTQ3NDUyMiYOFUA1J0zvQ</recordid><startdate>20231118</startdate><enddate>20231118</enddate><creator>Sam Wen Ping</creator><creator>Jeffrey Cheok Jun Wah</creator><creator>Lee Wen Jie</creator><creator>Yong Han, Jeremy Bong</creator><creator>Muzafar, Saira</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20231118</creationdate><title>Secure Software Development: Issues and Challenges</title><author>Sam Wen Ping ; Jeffrey Cheok Jun Wah ; Lee Wen Jie ; Yong Han, Jeremy Bong ; Muzafar, Saira</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_28941715223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Big Data</topic><topic>Cloud computing</topic><topic>Cybersecurity</topic><topic>Machine learning</topic><topic>Robotics</topic><topic>Software</topic><topic>Software development</topic><toplevel>online_resources</toplevel><creatorcontrib>Sam Wen Ping</creatorcontrib><creatorcontrib>Jeffrey Cheok Jun Wah</creatorcontrib><creatorcontrib>Lee Wen Jie</creatorcontrib><creatorcontrib>Yong Han, Jeremy Bong</creatorcontrib><creatorcontrib>Muzafar, Saira</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sam Wen Ping</au><au>Jeffrey Cheok Jun Wah</au><au>Lee Wen Jie</au><au>Yong Han, Jeremy Bong</au><au>Muzafar, Saira</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Secure Software Development: Issues and Challenges</atitle><jtitle>arXiv.org</jtitle><date>2023-11-18</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2023-11
issn 2331-8422
language eng
recordid cdi_proquest_journals_2894171522
source Free E- Journals
subjects Big Data
Cloud computing
Cybersecurity
Machine learning
Robotics
Software
Software development
title Secure Software Development: Issues and Challenges
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T13%3A25%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Secure%20Software%20Development:%20Issues%20and%20Challenges&rft.jtitle=arXiv.org&rft.au=Sam%20Wen%20Ping&rft.date=2023-11-18&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2894171522%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2894171522&rft_id=info:pmid/&rfr_iscdi=true