loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Investigate How Developers and Managers View Security Design in Software

Topics: Agile Systems Development; Analysis and Design Methods; Component-Based Software Engineering; Fault Tolerance and Recoverability; Frameworks and Middleware in Software Development; Quality Management; Reliability and Security; Risk Mitigation; Safety, Security and Compliance; Satisfaction, Usefulness and Trust; Software and Service Design; Software and Service Maintenance and Evolution; Software and System Interoperability; Software Change and Configuration Management; Software Patterns and Refactoring; SSE and Human Factors; SSE for Cloud and Edge Computing; SSE for Data and Process Mining ; SSE for E-Commerce and Mobile Commerce

Author: Asif Imran

Affiliation: Department of Computer Science, California State University San Marcos, 333 S Twin Oaks Valley Rd, San Marcos, CA 92096, U.S.A.

Keyword(s): Software Security, Secured Design, Security Trade-Off, Software Work Environment, Security Requirements, Cyber-Attack.

Abstract: Software security requirements have been traditionally considered as a non-functional attribute of the soft- ware. However, as more software started to provide services online, existing mechanisms of using firewalls and other hardware to secure software have lost their applicability. At the same time, under the current world circumstances, the increase of cyber-attacks on software is ever increasing. As a result, it is important to con- sider the security requirements of software during its design. To design security in the software, it is important to obtain the views of the developers and managers of the software. Also, it is important to evaluate if their viewpoints match or differ regarding the security. Conducting this communication through a specific model will enable the developers and managers to eliminate any doubts on security design and adopt an effective strategy to build security into the software. In this paper, we analyzed the viewpoints of developers and man- agers re garding their views on security design. We interviewed a team of 7 developers and 2 managers, who worked in two teams to build a real-life software product that was recently compromised by a cyber-attack. We obtained their views on the reasons for the successful attack by the malware and took their recommendations on the important aspects to consider regarding security. Based on their feedback, we coded their open-ended responses into 4 codes, which we recommended using for other real-life software as well. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.219.236.62

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Imran, A. (2023). Investigate How Developers and Managers View Security Design in Software. In Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE; ISBN 978-989-758-647-7; ISSN 2184-4895, SciTePress, pages 693-700. DOI: 10.5220/0011994700003464

@conference{enase23,
author={Asif Imran.},
title={Investigate How Developers and Managers View Security Design in Software},
booktitle={Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE},
year={2023},
pages={693-700},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011994700003464},
isbn={978-989-758-647-7},
issn={2184-4895},
}

TY - CONF

JO - Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE
TI - Investigate How Developers and Managers View Security Design in Software
SN - 978-989-758-647-7
IS - 2184-4895
AU - Imran, A.
PY - 2023
SP - 693
EP - 700
DO - 10.5220/0011994700003464
PB - SciTePress