ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Critical Elements of Computer Software Security

Verified

Added on  2022/11/17

|8
|1752
|371
AI Summary
This article discusses the critical elements of computer software security in the context of cyber security. It covers topics such as DevOps, software-defined networking, metadata management, and more.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
Cyber Security: Critical Elements of Computer Software Security
Name of the student:
Name of the University:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
Ebert, C., Gallardo, G., Hernantes, J., & Serrano, N. (2016). DevOps. Ieee Software, 33(3),
94-100.
According to (Ebert et al.,2016) the organization that uses the concept of DevOps
prcatices in the functional and operational activities can deploy software changes much faster.
DevOps software process highlights proper alliance between groups that are involved in the
software development process (Rahman & Williams, 2016). Instead of the alleged benefits and
popularity the security aspects is till date a apprehension for those companies that are interested
to take on DevOps.
Lee, C. S., Monark, M. W., Thomas, K. L., Murphree, W. E., & Baca, K. L. (2016). U.S.
Patent No. 9,424,167. Washington, DC: U.S. Patent and Trademark Office. This
particular process positively impacts the software security by using computerized
monitoring process, mechanical pipelines to organize software, by automatic testing and
development and delivering software with a smaller increment level (Lee et al., 2016).
These days in order to prioritize security work none of the agile software development
team uses ongoing risk assessment prcatices. Protection poker is referred to as a
collaborative as well as lightweight software security risk estimation mechanism used by
the agile teams. This article mainly focused on the technique or process of protection
poker that identifies different ways through which obstacles can be successfully tackled.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking:
SDN for big data and big data for SDN. IEEE network, 30(1), 58-65.
According to (Cui, Yu & Yan 2016) open flow protocol field capacity is always determined to be
as fixed and this is also completely limited. The packet which is forwarding in software
Document Page
2CYBER SECURITY
distinct network lacks some of the data sources, protection mechanism authentication and
integrity verification. The mentioned article discusses the details of software defined
mobile network security and the future of 5G wireless capacity. It also illustrates the
application of Software Defined Network (SDN), Network Function Virtualization
(NFV) that has a potential to offer quick, secured and reliable network services to the
users. In order to verify the security threats one of the most widely used method that
owners should adopt called SDMN.
Baca, M. (Ed.). (2016). Introduction to metadata. Getty Publications.
In order to look up metadata (Baca 2016) for separate objects like stack, heap, global etc
associated to memory scheme different system software security solution are available. A
new metadata management scheme is METAlloc that addresses the key limitations for
the existing solutions. Network controls and data planes can be decoupled through
Software Defined Networking (SDN). SDN architecture can empower the network
security with global visibility where a conflict can be successfully minimized.
Macedo, R., de Castro, R., Santos, A., Ghamri-Doudane, Y., & Nogueira, M. (2016,
December). Self-organized SDN controller cluster conformations against DDoS
attacks effects. In 2016 IEEE Global Communications Conference
(GLOBECOM) (pp. 1-6). IEEE.
Though, control and data plan separation sometimes open up some security challenges of
man in the middle, DDOS (Macedo et al., 2016), saturation attack etc. This article elaborates
requirements of architecture security and energy efficiency in the application of software defined
Networking (SDN). The Information And Communication Technology (ICT) infrastructure
Document Page
3CYBER SECURITY
increases rapidly with the increasing numbers of IOT applications and devices. It also identifies
that complex network architecture can become a simple one with this implementation. Issues of
intrusion detection, asymmetric route attack, buffer overflow attack and protocol specific attack
cn be resolved with this application.
Alsmadi, I., & Xu, D. (2015). Security of software defined networks: A survey. computers &
security, 53, 79-108.
Alsmadi and Xu (2015) stated that software Defined Networking (SDN) has successfully
emerged new network architecture to deal with new networking dynamics with the use of
software embedded control process. Security has become as a very important concern for the
promotion of the new network dynamics. From an extensive survey and analysis it is determined
that DOS, spoofing, phishing are the different software security threats required to be resolved
and minimized. The essence of this paper elaborates different aspects of enhancing software
security throughout the software development life cycle period. In order to protect the system
software different security measures are taken by different organizations (Sharma & Misra,
2017). Different security approaches those are used in SDLC process include threat modeling,
attack tree, attack network, vulnerability tree, architectural risk analysis etc. Each of these
security measures are essential for the software application.
Hu, Z., Wang, M., Yan, X., Yin, Y., & Luo, Z. (2015, February). A comprehensive security
architecture for SDN. In 2015 18th International Conference on Intelligence in Next
Generation Networks (pp. 30-37). IEEE.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY
The essence of this article defines the role of software defined network that decouples
data planes and network control (Hu et al., 2015). SDN security processes are analyzed
considering security challenges, man in the middle and saturation attacks.
Baumgarte, F., Allamanche, E. A., & Strommer, S. K. (2017). U.S. Patent No. 9,559,651.
Washington, DC: U.S. Patent and Trademark Office.
This article defines the roles of metadata management used to hardening the software
security (Baumgarte, Allamanche & Strommer 2017). There are different software securities
hardening approaches available those are widely used while retrieving information from any
server. METAlloc data structure is also represented in this paper and its applications are also
elaborated.
Wysopal, C. J., Eng, C. J., & Moynahan, M. P. (2019). U.S. Patent Application No.
10/275,600.
This article defines that, software security is a process used to build software that may
secure system from any kind of external attacks (Wysopal, Eng & Moynahan,. 2019). A detail
survey result is being elaborated in this paper considering a public organization in Norway and
building security in maturity model. From findings it has been identified that there are large
possible improvement opportunities available.
Wei, Z., & Zhao, B. (2017). A Space Information Service Forwarding Mechnism Based on
Software Defined Network. J. Internet Serv. Inf. Secur., 7(3), 48-60.
This paper defines he space required for information service forwarding mechanism that
is based on software defines network. The security that has been proposed in the article is SIS
Document Page
5CYBER SECURITY
model. A detail software defines network is prepared in this paper that is three layered data
place, control plane and application layer. It is identified that, tunnel customization model is the
best suited model that can be used to improve the overall system functionalities.
Document Page
6CYBER SECURITY
References
Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined
networks: A survey. IEEE Communications Surveys & Tutorials, 17(4), 2317-2346.
Alsmadi, I., & Xu, D. (2015). Security of software defined networks: A survey. computers &
security, 53, 79-108.
Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile networks
security. Mobile Networks and Applications, 21(5), 729-743.
Haller, I., Van Der Kouwe, E., Giuffrida, C., & Bos, H. (2016, April). METAlloc: Efficient and
comprehensive metadata management for software security hardening. In Proceedings of
the 9th European Workshop on System Security (p. 5). ACM.
Jaatun, M. G., Cruzes, D. S., Bernsmed, K., Tøndel, I. A., & Røstad, L. (2015, September).
Software security maturity in public organisations. In International Conference on
Information Security (pp. 120-138). Springer, Cham.
Rahman, A. A. U., & Williams, L. (2016, May). Software security in devops: synthesizing
practitioners’ perceptions and practices. In 2016 IEEE/ACM International Workshop on
Continuous Software Evolution and Delivery (CSED) (pp. 70-76). IEEE.
Rawat, D. B., & Reddy, S. R. (2016). Software defined networking architecture, security and
energy efficiency: A survey. IEEE Communications Surveys & Tutorials, 19(1), 325-346.
Sharma, A., & Misra, P. K. (2017). Aspects of enhancing security in software development life
cycle. Advances in Computational Sciences and Technology, 10(2), 203-210.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7CYBER SECURITY
Wei, Z., & Zhao, B. (2017). A Space Information Service Forwarding Mechnism Based on
Software Defined Network. J. Internet Serv. Inf. Secur., 7(3), 48-60.
Zuo, Z., He, R., Zhu, X., & Chang, C. (2019). A novel software-defined network packet security
tunnel forwarding mechanism.
1 out of 8
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]