This article discusses the critical elements of computer software security in the context of cyber security. It covers topics such as DevOps, software-defined networking, metadata management, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:CYBER SECURITY Cyber Security: Critical Elements of Computer Software Security Name of the student: Name of the University:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY Ebert, C., Gallardo, G., Hernantes, J., & Serrano, N. (2016). DevOps.Ieee Software,33(3), 94-100. According to (Ebert et al.,2016)the organization that uses the concept of DevOps prcatices in the functional and operational activities can deploy software changes much faster. DevOps software process highlights proper alliance between groups that are involved in the software development process (Rahman & Williams, 2016). Instead of the alleged benefits and popularity the security aspects is till date a apprehension for those companies that are interested to take on DevOps. Lee, C. S., Monark, M. W., Thomas, K. L., Murphree, W. E., & Baca, K. L. (2016).U.S. Patent No. 9,424,167. Washington, DC: U.S. Patent and Trademark Office.This particularprocesspositivelyimpactsthesoftwaresecuritybyusingcomputerized monitoring process, mechanical pipelines to organize software, by automatic testing and development and delivering software with a smaller increment level (Lee et al., 2016). These days in order to prioritize security work none of the agile software development team uses ongoing risk assessment prcatices. Protection poker is referred to as a collaborative as well as lightweight software security risk estimation mechanism used by the agile teams. This article mainly focused on the technique or process of protection poker that identifies different ways through which obstacles can be successfully tackled. Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking: SDN for big data and big data for SDN.IEEE network,30(1), 58-65. According to(Cui, Yu & Yan 2016) open flow protocol field capacity is always determined to be as fixed and this is also completely limited. The packet which is forwarding in software
2CYBER SECURITY distinct network lacks some of the data sources, protection mechanism authentication and integrity verification. The mentioned article discusses the details of software defined mobile network security and the future of 5G wireless capacity. It also illustrates the applicationofSoftwareDefinedNetwork(SDN),NetworkFunctionVirtualization (NFV) that has a potential to offer quick, secured and reliable network services to the users. In order to verify the security threats one of the most widely used method that owners should adopt called SDMN. Baca, M. (Ed.). (2016).Introduction to metadata. Getty Publications. In order to look up metadata (Baca 2016)for separate objects like stack, heap, global etc associated to memory scheme different system software security solution are available. A new metadata management scheme is METAlloc that addresses the key limitations for the existing solutions. Network controls and data planes can be decoupled through Software Defined Networking (SDN). SDN architecture can empower the network security with global visibility where a conflict can be successfully minimized. Macedo, R., de Castro, R., Santos, A., Ghamri-Doudane, Y., & Nogueira, M. (2016, December). Self-organized SDN controller cluster conformations against DDoS attackseffects.In2016IEEEGlobalCommunicationsConference (GLOBECOM)(pp. 1-6). IEEE. Though, control and data plan separation sometimes open up some security challenges of man in the middle, DDOS (Macedo et al., 2016), saturation attack etc. This article elaborates requirements of architecture security and energy efficiency in the application of software defined Networking (SDN). The Information And Communication Technology (ICT) infrastructure
3CYBER SECURITY increases rapidly with the increasing numbers of IOT applications and devices. It also identifies that complex network architecture can become a simple one with this implementation. Issues of intrusion detection, asymmetric route attack, buffer overflow attack and protocol specific attack cn be resolved with this application. Alsmadi, I., & Xu, D. (2015). Security of software defined networks: A survey.computers & security,53, 79-108. Alsmadi and Xu (2015) stated that software Defined Networking (SDN) has successfully emerged new network architecture to deal with new networking dynamics with the use of software embedded control process. Security has become as a very important concern for the promotion of the new network dynamics. From an extensive survey and analysis it is determined that DOS, spoofing, phishing are the different software security threats required to be resolved and minimized.The essence of this paper elaborates different aspects of enhancing software security throughout the software development life cycle period. In order to protect the system software different security measures are taken by different organizations (Sharma & Misra, 2017). Different security approaches those are used in SDLC process include threat modeling, attack tree, attack network, vulnerability tree, architectural risk analysis etc. Each of these security measures are essential for the software application. Hu, Z., Wang, M., Yan, X., Yin, Y., & Luo, Z. (2015, February). A comprehensive security architecture for SDN. In2015 18th International Conference on Intelligence in Next Generation Networks(pp. 30-37). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBER SECURITY The essence of this article defines the role of software defined network that decouples data planes and network control (Hu et al., 2015). SDN security processes are analyzed considering security challenges, man in the middle and saturation attacks. Baumgarte, F., Allamanche, E. A., & Strommer, S. K. (2017).U.S. Patent No. 9,559,651. Washington, DC: U.S. Patent and Trademark Office. This article defines the roles of metadata management used to hardening the software security (Baumgarte,Allamanche & Strommer 2017). There are different software securities hardening approaches available those are widely used while retrieving information from any server. METAlloc data structure is also represented in this paper and its applications are also elaborated. Wysopal, C. J., Eng, C. J., & Moynahan, M. P. (2019).U.S. Patent Application No. 10/275,600. This article defines that, software security is a process used to build software that may secure system from any kind of external attacks (Wysopal, Eng & Moynahan,. 2019). A detail survey result is being elaborated in this paper considering a public organization in Norway and building security in maturity model. From findings it has been identified that there are large possible improvement opportunities available. Wei, Z., & Zhao, B. (2017). A Space Information Service Forwarding Mechnism Based on Software Defined Network.J. Internet Serv. Inf. Secur.,7(3), 48-60. This paper defines he space required for information service forwarding mechanism that is based on software defines network. The security that has been proposed in the article is SIS
5CYBER SECURITY model. A detail software defines network is prepared in this paper that is three layered data place, control plane and application layer. It is identified that, tunnel customization model is the best suited model that can be used to improve the overall system functionalities.
6CYBER SECURITY References Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined networks: A survey.IEEE Communications Surveys & Tutorials,17(4), 2317-2346. Alsmadi, I., & Xu, D. (2015). Security of software defined networks: A survey.computers & security,53, 79-108. Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile networks security.Mobile Networks and Applications,21(5), 729-743. Haller, I., Van Der Kouwe, E., Giuffrida, C., & Bos, H. (2016, April). METAlloc: Efficient and comprehensive metadata management for software security hardening. InProceedings of the 9th European Workshop on System Security(p. 5). ACM. Jaatun, M. G., Cruzes, D. S., Bernsmed, K., Tøndel, I. A., & Røstad, L. (2015, September). Softwaresecuritymaturityinpublicorganisations.InInternationalConferenceon Information Security(pp. 120-138). Springer, Cham. Rahman, A. A. U., & Williams, L. (2016, May). Software security in devops: synthesizing practitioners’ perceptions and practices. In2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED)(pp. 70-76). IEEE. Rawat, D. B., & Reddy, S. R. (2016). Software defined networking architecture, security and energy efficiency: A survey.IEEE Communications Surveys & Tutorials,19(1), 325-346. Sharma, A., & Misra, P. K. (2017). Aspects of enhancing security in software development life cycle.Advances in Computational Sciences and Technology,10(2), 203-210.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CYBER SECURITY Wei, Z., & Zhao, B. (2017). A Space Information Service Forwarding Mechnism Based on Software Defined Network.J. Internet Serv. Inf. Secur.,7(3), 48-60. Zuo, Z., He, R., Zhu, X., & Chang, C. (2019). A novel software-defined network packet security tunnel forwarding mechanism.