Ask a question from expert

Ask now

Secure Software Process Models and Metrics Name of the University:

19 Pages4444 Words387 Views
   

Added on  2020-04-21

About This Document

SECURE SOFTWARE PROCESS MODELS AND METRICS SECURE SOFTWARE PROCESS MODELS AND METRICS 3 Secure software process models and metrics Name of the university: Author note: Introduction 2 1.Safety critical activities for reliable software 2 2. Safety critical activities for reliable software Software Safety is one of the most imperative as well as examined in various software standards, determining needs for benefit of clients, applications, hardware in order to evade failures in software development.

Secure Software Process Models and Metrics Name of the University:

   Added on 2020-04-21

BookmarkShareRelated Documents
Running head: SECURE SOFTWARE PROCESS MODELS AND METRICS
Secure software process models and metrics
Name of the Student:
Name of the university:
Author note:
Secure Software Process Models and Metrics Name of the University:_1
1SECURE SOFTWARE PROCESS MODELS AND METRICS
Table of Contents
Introduction....................................................................................................................................2
1.Safety critical activities for reliable software.............................................................................2
2. Comparison of life cycle model and security concerns in developing secure software............6
3. Use cases for safety critical activities......................................................................................11
4. Threat assessment of any particular attack..............................................................................14
5. Identification of attack type within a taxonomy of attack types..............................................15
6. Risk assessment for the identified attack.................................................................................18
Conclusion...................................................................................................................................19
Bibliography................................................................................................................................21
Secure Software Process Models and Metrics Name of the University:_2
2SECURE SOFTWARE PROCESS MODELS AND METRICS
Introduction
Safety critical activities is a set of activities that comprises everything related to hardware,
software as well as human aspects required to perform safety actions where failure would cause
important increment in the safety risks for people and involving environment. In the present study,
safety related system is discussed that would be helpful to develop reliable software. A software is
said to be safe if it is very unrealistic or an at times occurrence to deliver a process that could or
allow hazards to occur the system which it controls. Software Engineering of Safety critical
computer systems requires a cleared up or arranged comprehension of correct part of software and
its associations with the system. The system describes safety critical activities for developing
reliable software. Life cycle models of security concerns, detection of attack types within taxonomy
of attack types are explained in the study.
1. Safety critical activities for reliable software
Software Safety is one of the most imperative as well as examined in various software
standards, determining needs for benefit of clients, applications, hardware in order to evade failures
in software development. In addition, leading to threats by association of the computer systems, all
things considered1. Particularly in uses of software critical systems, commitments of software
failures leads to big threat to human life, significant financial misfortune as well as broad harm to
make condition2. As there are no standards structure existed, which exhaustively address security of
software, there is requirement for getting accurate remedy as well as essentiality of software quality
1Baskerville, R., Spagnoletti, P. and Kim, J., 2014. Incident-centered information security: Managing a strategic balance
between prevention and response. Information & Management, 51(1), pp.138-151.
2Thomas, D.R., Beresford, A.R. and Rice, A., 2015, October. Security metrics for the android ecosystem.
In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile
Devices (pp. 87-98). ACM.
Secure Software Process Models and Metrics Name of the University:_3
3SECURE SOFTWARE PROCESS MODELS AND METRICS
as well as principles or for audit of the different guidelines and models in safety basic processing
systems.
Software development of a safety-critical system needs an unmistakable comprehension of
the part of software in and cooperation with, the system3. These systems require the most extreme
care in their determination, outline, usage, operation and upkeep, as they could prompt injury or
loss of lives; thus it results in monetary misfortune. This kind of system is considered in this
examination. Various reliability regimes for safety critical systems that can be explained as
followed. Fail-operational system is continuing for operating when the control systems fail.
On the other hand, safety critical activities in software engineering are difficult to achieve.
The activities can be explained as followed.
First is process engineering as well as management.
Second activity is selection of proper tools as well as environment for particular
system.
Third activity is addressing any type of legal as well as regulatory needs like FAA
requirements for aviation.
However, dependable, seemingly safe concepts as well as structures come up short phases,
because of three essential reasons. There are some outstanding cases of safety critical systems
application ranges, for example, car, resistance, air movement, air make controlling, transportation,
interchanges, therapeutic diagnostics, atomic, warm and nuclear power, instrumentation4. Since, the
09safety is subject to the right and ideal wanted execution of the software, this paper principally
3Almasizadeh, J. and Azgomi, M.A., 2013. A stochastic model of attack process for the evaluation of security
metrics. Computer Networks, 57(10), pp.2159-2180.
4Boehm, B., Lane, J.A., Koolmanojwong, S. and Turner, R., 2014. The incremental commitment spiral model:
Principles and practices for successful systems and software. Addison-Wesley Professional.
Secure Software Process Models and Metrics Name of the University:_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Software Engineering
|16
|3652
|74

Software Reliability Testing
|20
|3852
|498

Types of Engineering Strategies in Rail Engineering Equipment
|21
|4179
|259

Software Security: Importance, Techniques and Limitations
|9
|2795
|469

Cyber Security Improvement Plan Proposal
|5
|928
|93

Different UML Diagrams in Software Development
|16
|3422
|254