Secure Software Process Models and Metrics Name of the University:
19 Pages4444 Words387 Views
Added on 2020-04-21
About This Document
SECURE SOFTWARE PROCESS MODELS AND METRICS SECURE SOFTWARE PROCESS MODELS AND METRICS 3 Secure software process models and metrics Name of the university: Author note: Introduction 2 1.Safety critical activities for reliable software 2 2. Safety critical activities for reliable software Software Safety is one of the most imperative as well as examined in various software standards, determining needs for benefit of clients, applications, hardware in order to evade failures in software development.
Secure Software Process Models and Metrics Name of the University:
Added on 2020-04-21
BookmarkShareRelated Documents
Running head: SECURE SOFTWARE PROCESS MODELS AND METRICS Secure software process models and metrics Name of the Student: Name of the university: Author note:
1SECURE SOFTWARE PROCESS MODELS AND METRICS Table of Contents Introduction....................................................................................................................................2 1.Safety critical activities for reliable software.............................................................................2 2. Comparison of life cycle model and security concerns in developing secure software............6 3. Use cases for safety critical activities......................................................................................11 4. Threat assessment of any particular attack..............................................................................14 5. Identification of attack type within a taxonomy of attack types..............................................15 6. Risk assessment for the identified attack.................................................................................18 Conclusion...................................................................................................................................19 Bibliography................................................................................................................................21
2SECURE SOFTWARE PROCESS MODELS AND METRICS Introduction Safety critical activities is a set of activities that comprises everything related to hardware, software as well as human aspects required to perform safety actions where failure would cause important increment in the safety risks for people and involving environment.In the present study, safety related system is discussed that would be helpful to develop reliable software.A softwareis said to be safe if it is very unrealistic or an at times occurrence to deliver a process that could or allow hazards to occur the system which it controls. Software Engineering of Safety critical computer systems requires a cleared up or arranged comprehension of correct part of software and its associations with the system. The system describes safety critical activities for developing reliable software. Life cycle models of security concerns, detection of attack types within taxonomy of attack types are explained in the study. 1.Safety critical activities for reliable software Software Safety is one of the most imperative as well as examined in various software standards, determining needs for benefit of clients, applications, hardware in order to evade failures in software development. In addition, leading to threats by association of the computer systems, all things considered1. Particularly in uses of software critical systems, commitments of software failures leads to big threat to human life, significant financial misfortune as well as broad harm to make condition2. As there are no standards structure existed, which exhaustively address security of software, there is requirement for getting accurate remedy as well as essentiality of software quality 1Baskerville, R., Spagnoletti, P. and Kim, J., 2014. Incident-centered information security: Managing a strategic balance between prevention and response.Information & Management,51(1), pp.138-151. 2Thomas,D.R.,Beresford,A.R.andRice,A.,2015,October.Securitymetricsfortheandroidecosystem. InProceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices(pp. 87-98). ACM.
3SECURE SOFTWARE PROCESS MODELS AND METRICS as well as principles or for audit of the different guidelines and models in safety basic processing systems. Software development of a safety-critical system needs an unmistakable comprehension of the part of software in and cooperation with, the system3. These systems require the most extreme care in their determination, outline, usage, operation and upkeep, as they could prompt injury or loss of lives; thus it results in monetary misfortune. This kind of system is considered in this examination. Various reliability regimes for safety critical systems that can be explained as followed. Fail-operational system is continuing for operating when the control systems fail. On the other hand, safety critical activities in software engineering are difficult to achieve. The activities can be explained as followed. First is process engineering as well as management. Second activity is selection of proper tools as well as environment for particular system. Third activity is addressing any type of legal as well as regulatory needs like FAA requirements for aviation. However, dependable, seemingly safe concepts as well as structures come up short phases, because of three essential reasons. There are some outstanding cases of safety critical systems application ranges, for example, car, resistance, air movement, air make controlling, transportation, interchanges, therapeutic diagnostics, atomic, warm and nuclear power, instrumentation4. Since, the 09safety is subject to the right and ideal wanted execution of the software, this paper principally 3Almasizadeh, J. and Azgomi, M.A., 2013. A stochastic model of attack process for the evaluation of security metrics.Computer Networks,57(10), pp.2159-2180. 4Boehm, B., Lane, J.A., Koolmanojwong, S. and Turner, R., 2014.The incremental commitment spiral model: Principles and practices for successful systems and software. Addison-Wesley Professional.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment on Software Engineeringlg...
|16
|3652
|74
Software Reliability Testinglg...
|20
|3852
|498
Types of Engineering Strategies in Rail Engineering Equipmentlg...
|21
|4179
|259
Software Security: Importance, Techniques and Limitationslg...
|9
|2795
|469
Cyber Security Improvement Plan Proposallg...
|5
|928
|93
Different UML Diagrams in Software Developmentlg...