logo

Critical Elements of Computer Software Security

   

Added on  2022-11-17

8 Pages1752 Words371 Views
Running head: CYBER SECURITY
Cyber Security: Critical Elements of Computer Software Security
Name of the student:
Name of the University:

1CYBER SECURITY
Ebert, C., Gallardo, G., Hernantes, J., & Serrano, N. (2016). DevOps. Ieee Software, 33(3),
94-100.
According to (Ebert et al.,2016) the organization that uses the concept of DevOps
prcatices in the functional and operational activities can deploy software changes much faster.
DevOps software process highlights proper alliance between groups that are involved in the
software development process (Rahman & Williams, 2016). Instead of the alleged benefits and
popularity the security aspects is till date a apprehension for those companies that are interested
to take on DevOps.
Lee, C. S., Monark, M. W., Thomas, K. L., Murphree, W. E., & Baca, K. L. (2016). U.S.
Patent No. 9,424,167. Washington, DC: U.S. Patent and Trademark Office. This
particular process positively impacts the software security by using computerized
monitoring process, mechanical pipelines to organize software, by automatic testing and
development and delivering software with a smaller increment level (Lee et al., 2016).
These days in order to prioritize security work none of the agile software development
team uses ongoing risk assessment prcatices. Protection poker is referred to as a
collaborative as well as lightweight software security risk estimation mechanism used by
the agile teams. This article mainly focused on the technique or process of protection
poker that identifies different ways through which obstacles can be successfully tackled.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking:
SDN for big data and big data for SDN. IEEE network, 30(1), 58-65.
According to (Cui, Yu & Yan 2016) open flow protocol field capacity is always determined to be
as fixed and this is also completely limited. The packet which is forwarding in software

2CYBER SECURITY
distinct network lacks some of the data sources, protection mechanism authentication and
integrity verification. The mentioned article discusses the details of software defined
mobile network security and the future of 5G wireless capacity. It also illustrates the
application of Software Defined Network (SDN), Network Function Virtualization
(NFV) that has a potential to offer quick, secured and reliable network services to the
users. In order to verify the security threats one of the most widely used method that
owners should adopt called SDMN.
Baca, M. (Ed.). (2016). Introduction to metadata. Getty Publications.
In order to look up metadata (Baca 2016) for separate objects like stack, heap, global etc
associated to memory scheme different system software security solution are available. A
new metadata management scheme is METAlloc that addresses the key limitations for
the existing solutions. Network controls and data planes can be decoupled through
Software Defined Networking (SDN). SDN architecture can empower the network
security with global visibility where a conflict can be successfully minimized.
Macedo, R., de Castro, R., Santos, A., Ghamri-Doudane, Y., & Nogueira, M. (2016,
December). Self-organized SDN controller cluster conformations against DDoS
attacks effects. In 2016 IEEE Global Communications Conference
(GLOBECOM) (pp. 1-6). IEEE.
Though, control and data plan separation sometimes open up some security challenges of
man in the middle, DDOS (Macedo et al., 2016), saturation attack etc. This article elaborates
requirements of architecture security and energy efficiency in the application of software defined
Networking (SDN). The Information And Communication Technology (ICT) infrastructure

End of preview

Want to access all the pages? Upload your documents or become a member.