Security Metrics in Software Quality Assurance Process
VerifiedAdded on 2022/08/11
|3
|1438
|17
AI Summary
Critique Instruction and paper attached.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CRITICAL ANALYSIS ON THE SECURITY METRICS IN SOFTWARE QUALITY ASSURANCE
PROCESS
CRITICAL ANALYSIS
ON
SECURITY METRICS
IN
SOFTWARE QUALITY ASSURANCE
PROCESS
Name of the Student
Name of the University
Author Note:
PROCESS
CRITICAL ANALYSIS
ON
SECURITY METRICS
IN
SOFTWARE QUALITY ASSURANCE
PROCESS
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY METRICS IN SOFTWARE QUALITY ASSURANCE PROCESS
I. Introduction:
Considering the rapid growth of
technology it is very prominent that security
metrics is one of the most effective strategy to
protect the software quality assurance process.
Followed by this process the Athena et al.,
(2012) has primarily focused on analyzing the
how the utilization of security metrics in the
software quality assurance process is impacting
the security of the nominated process. As the
topic suggest in the selected paper has been
developed with the purpose to analyze the
importance of security in technology as well as
how the process of security management and
supervision process enhances the services of the
nominated development process [1].
The primary aim of this paper is to
critically analyze the paper titled “Using
Security Metrics in Software Quality Assurance
Process” which written by Athena et al., (2012).
During the analysis process the primary
objective as well as the primary idea of the
authors will be effectively analyzed and it will
further proceed by evaluating the entire
research conducted by Athena et al., (2012).
Lastly, it will conclude by a review statement
which will summarize the paper and the key
points of the research then it will consist a
recommendation based on the review as well.
II. Summary:
Followed by a thorough analysis of the
paper written by Athena et al., (2012), on the
security of software quality assurance process it
is observed that the paper has primarily focused
on the discussion of security metrics, RUP
development as well as the process of software
testing and the criteria of validation [2].
Considering these identification it is observed
that in this paper it is clearly stated that a
software development process is nothing but a
structural process that includes several stages to
effectively develop any software. And in the
software development process one of the most
essential aspect is the software quality
assurance process as it process is stands for the
activity which is utilized to maintain the quality
of the developed software. Followed by these
statements the author has also discussed about
the security of the developed software in which
it is stated that for each phases of the software
development process maintaining security is
very essential as this is one of the key
functionality to improve the software
development process [3]. Followed by the
discussion on these aspects Athena et al., (2012)
has also discussed about several other practices
in the same field where it is identified that
WISSSR and SMOS were one of the initial
approach towards analyzing the features of
security metrics as well the security model
techniques respectively. Making allowance to
this concern it is noticed that in order to
effectively develop any software the application
of Rational Unified Process has (RUP) has been
selected in this research paper. While analyzing
the working capabilities of RUP it is noticed
that Athena et al., (2012) has effectively
elaborated four major phases of the nominated
software development model which includes
the inception, elaboration, construction and the
transition. Followed by these identification
these aspects Athena et al., (2012) has also
discussed about several vulnerabilities of
security metrics that may significantly impact
the effectiveness of the nominated software
development process and the detail discussion
of the essential software validation factors are
present in this paper. And lastly the research has
concluded by summarizing the entire research
and findings which has provided an overview of
the selected research paper.
III. Evaluation:
After analyzing the selected research
paper it is observed that there are several
significant factors which has influence the
success of this research paper. Considering this
aspect each essential element of this paper has
been analyzed based on several validation
criteria. Initially in the introduction part Athena
et al., (2012) has discussed about the software
development process as well as their steps
I. Introduction:
Considering the rapid growth of
technology it is very prominent that security
metrics is one of the most effective strategy to
protect the software quality assurance process.
Followed by this process the Athena et al.,
(2012) has primarily focused on analyzing the
how the utilization of security metrics in the
software quality assurance process is impacting
the security of the nominated process. As the
topic suggest in the selected paper has been
developed with the purpose to analyze the
importance of security in technology as well as
how the process of security management and
supervision process enhances the services of the
nominated development process [1].
The primary aim of this paper is to
critically analyze the paper titled “Using
Security Metrics in Software Quality Assurance
Process” which written by Athena et al., (2012).
During the analysis process the primary
objective as well as the primary idea of the
authors will be effectively analyzed and it will
further proceed by evaluating the entire
research conducted by Athena et al., (2012).
Lastly, it will conclude by a review statement
which will summarize the paper and the key
points of the research then it will consist a
recommendation based on the review as well.
II. Summary:
Followed by a thorough analysis of the
paper written by Athena et al., (2012), on the
security of software quality assurance process it
is observed that the paper has primarily focused
on the discussion of security metrics, RUP
development as well as the process of software
testing and the criteria of validation [2].
Considering these identification it is observed
that in this paper it is clearly stated that a
software development process is nothing but a
structural process that includes several stages to
effectively develop any software. And in the
software development process one of the most
essential aspect is the software quality
assurance process as it process is stands for the
activity which is utilized to maintain the quality
of the developed software. Followed by these
statements the author has also discussed about
the security of the developed software in which
it is stated that for each phases of the software
development process maintaining security is
very essential as this is one of the key
functionality to improve the software
development process [3]. Followed by the
discussion on these aspects Athena et al., (2012)
has also discussed about several other practices
in the same field where it is identified that
WISSSR and SMOS were one of the initial
approach towards analyzing the features of
security metrics as well the security model
techniques respectively. Making allowance to
this concern it is noticed that in order to
effectively develop any software the application
of Rational Unified Process has (RUP) has been
selected in this research paper. While analyzing
the working capabilities of RUP it is noticed
that Athena et al., (2012) has effectively
elaborated four major phases of the nominated
software development model which includes
the inception, elaboration, construction and the
transition. Followed by these identification
these aspects Athena et al., (2012) has also
discussed about several vulnerabilities of
security metrics that may significantly impact
the effectiveness of the nominated software
development process and the detail discussion
of the essential software validation factors are
present in this paper. And lastly the research has
concluded by summarizing the entire research
and findings which has provided an overview of
the selected research paper.
III. Evaluation:
After analyzing the selected research
paper it is observed that there are several
significant factors which has influence the
success of this research paper. Considering this
aspect each essential element of this paper has
been analyzed based on several validation
criteria. Initially in the introduction part Athena
et al., (2012) has discussed about the software
development process as well as their steps
2SECURITY METRICS IN SOFTWARE QUALITY ASSURANCE PROCESS
rather than discussing about the importance of
security in the software development process.
However, followed by the discussion of the
software development process it has elaborated
the key factors of software quality assurance
where it is mentioned and then the necessity of
the security controls are mentioned in this
section [4]. After analyzing this part of the
research paper it can be concluded that the
paper has effective discussed about all of the
possible key aspects however, it could be more
approaching if Athena et al., (2012) had
included more informative contents about
software information security and its impact on
the development process [5]. Along these
discussion it is observed that the discussion on
the workshop on information security system,
scoring and ranking as well as the security
metrics objective segment has effectively
provided a detail idea about the security metrics
of the software development process [6]. While
analyzing these process it is observed that there
are several criteria is present which are related
to software validation. Those criteria includes
the objective of the developed software,
security controls of the initial software as well
as the expected result from the approached
security measure [7]. Hence, after analyzing
these discussion it can be stated that this is one
of the strongest aspect of this research paper as
this will help to get a detail idea about the
application of the security metrics on the
development process. Along with these Athena
et al., (2012) it has accounted Rational Unified
Process, which is also one of the most effective
method of the software development [8]. Thus,
it can be stated that this will majorly help to get
an idea about how adoption of effective
technique could provide security to the
development process.
IV. Conclusion:
After completion of the analysis of the
nominated paper it can be concluded that this
paper has effectively discussed about all of the
necessary aspect of software development
process as well as the security metrics which
the purpose to enhance quality of the
approached software. Followed by these
identification it is also determined that this
paper has effectively analyzed several software
development model and security matrices thus,
it can be stated that this is one of the best paper
on the topic of security metrics in software
quality assurance process as in this paper it is
effectively discussed all of the key
functionalities of the nominated topic.
V. Reference:
[1] A. Abdi, A. Souzani, M. Amirfakhri and A.B.
Moghadam 2012, November. Using security metrics
in software quality assurance process. In 6th
International Symposium on Telecommunications
(IST) (pp. 1099-1102). IEEE.
[2] W.jansen, “Directions in security metric
research,” National Institute of Standards and
Technology, NISTIR 7564, 2009.
[3] Reijo M. Savola,” A Security Metrics
Taxonomization Model for Software-Intensive
Systems,” Journal of Information Processing
Systems, 2009.
[4] R. Savola, H. Abie, “Identification of Basic
Measurable Security Components for a
Distributed Messaging System,” SECURWARE
’09, Greece, PP. 121-128, 2009.
[5] K. Julisch, “A unified theory of security
metrics with applications,” IBM research
Zurich, , 2009.
[6] N. Seddigh, P. Pieda, A. Matrawy, B. Nandy,
I. Lambadaris, A. Hatfield, “Current Trenes and
Ad-vances in Information Assurance Metrics,”
PST ’04, Fredericton, NB, Canada, Oct., 2004.
[7] M. Swanson, “Security Self-Assessment
Guide for Information Technology Systems,”
NIST Special Publication 800-26, Nov., 2001
[8] R. Savola, “On the feasibility of utilizing
security metrics in softwareintensive systems,”
International journal of computer science and
network security (IJCSNS), Vol. 10, No. 10,
January 2010.
rather than discussing about the importance of
security in the software development process.
However, followed by the discussion of the
software development process it has elaborated
the key factors of software quality assurance
where it is mentioned and then the necessity of
the security controls are mentioned in this
section [4]. After analyzing this part of the
research paper it can be concluded that the
paper has effective discussed about all of the
possible key aspects however, it could be more
approaching if Athena et al., (2012) had
included more informative contents about
software information security and its impact on
the development process [5]. Along these
discussion it is observed that the discussion on
the workshop on information security system,
scoring and ranking as well as the security
metrics objective segment has effectively
provided a detail idea about the security metrics
of the software development process [6]. While
analyzing these process it is observed that there
are several criteria is present which are related
to software validation. Those criteria includes
the objective of the developed software,
security controls of the initial software as well
as the expected result from the approached
security measure [7]. Hence, after analyzing
these discussion it can be stated that this is one
of the strongest aspect of this research paper as
this will help to get a detail idea about the
application of the security metrics on the
development process. Along with these Athena
et al., (2012) it has accounted Rational Unified
Process, which is also one of the most effective
method of the software development [8]. Thus,
it can be stated that this will majorly help to get
an idea about how adoption of effective
technique could provide security to the
development process.
IV. Conclusion:
After completion of the analysis of the
nominated paper it can be concluded that this
paper has effectively discussed about all of the
necessary aspect of software development
process as well as the security metrics which
the purpose to enhance quality of the
approached software. Followed by these
identification it is also determined that this
paper has effectively analyzed several software
development model and security matrices thus,
it can be stated that this is one of the best paper
on the topic of security metrics in software
quality assurance process as in this paper it is
effectively discussed all of the key
functionalities of the nominated topic.
V. Reference:
[1] A. Abdi, A. Souzani, M. Amirfakhri and A.B.
Moghadam 2012, November. Using security metrics
in software quality assurance process. In 6th
International Symposium on Telecommunications
(IST) (pp. 1099-1102). IEEE.
[2] W.jansen, “Directions in security metric
research,” National Institute of Standards and
Technology, NISTIR 7564, 2009.
[3] Reijo M. Savola,” A Security Metrics
Taxonomization Model for Software-Intensive
Systems,” Journal of Information Processing
Systems, 2009.
[4] R. Savola, H. Abie, “Identification of Basic
Measurable Security Components for a
Distributed Messaging System,” SECURWARE
’09, Greece, PP. 121-128, 2009.
[5] K. Julisch, “A unified theory of security
metrics with applications,” IBM research
Zurich, , 2009.
[6] N. Seddigh, P. Pieda, A. Matrawy, B. Nandy,
I. Lambadaris, A. Hatfield, “Current Trenes and
Ad-vances in Information Assurance Metrics,”
PST ’04, Fredericton, NB, Canada, Oct., 2004.
[7] M. Swanson, “Security Self-Assessment
Guide for Information Technology Systems,”
NIST Special Publication 800-26, Nov., 2001
[8] R. Savola, “On the feasibility of utilizing
security metrics in softwareintensive systems,”
International journal of computer science and
network security (IJCSNS), Vol. 10, No. 10,
January 2010.
1 out of 3
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.