CFP last date
20 December 2024
Reseach Article

To Enhance Software Security through Testing Stage of Software Development Life Cycle

Published on August 2011 by Vidyabhushan Anantrao Upadhye, Prof. Dr. Shashank D. Joshi
journal_cover_thumbnail
National Technical Symposium on Advancements in Computing Technologies
Foundation of Computer Science USA
NTSACT - Number 3
August 2011
Authors: Vidyabhushan Anantrao Upadhye, Prof. Dr. Shashank D. Joshi
c1ae7609-5c2d-4c52-b6ce-33f7f8b5e983

Vidyabhushan Anantrao Upadhye, Prof. Dr. Shashank D. Joshi . To Enhance Software Security through Testing Stage of Software Development Life Cycle. National Technical Symposium on Advancements in Computing Technologies. NTSACT, 3 (August 2011), 31-33.

@article{
author = { Vidyabhushan Anantrao Upadhye, Prof. Dr. Shashank D. Joshi },
title = { To Enhance Software Security through Testing Stage of Software Development Life Cycle },
journal = { National Technical Symposium on Advancements in Computing Technologies },
issue_date = { August 2011 },
volume = { NTSACT },
number = { 3 },
month = { August },
year = { 2011 },
issn = 0975-8887,
pages = { 31-33 },
numpages = 3,
url = { /proceedings/ntsact/number3/3197-ntst018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Technical Symposium on Advancements in Computing Technologies
%A Vidyabhushan Anantrao Upadhye
%A Prof. Dr. Shashank D. Joshi
%T To Enhance Software Security through Testing Stage of Software Development Life Cycle
%J National Technical Symposium on Advancements in Computing Technologies
%@ 0975-8887
%V NTSACT
%N 3
%P 31-33
%D 2011
%I International Journal of Computer Applications
Abstract

Keeping in view the daily increase in software security threats, developing secure software has become a necessity. Early detection of vulnerabilities in a software while developing it and countering them in the software development cycle will save time and energy spent on removing them after software release. In this paper we try to enhance software security through Testing Stage of software development life cycle.

References
  1. Davis, G. McGraw, “Software Security,” IEEE Security & Privacy, vol. 2, no. 2, 2004, pp. 80–83.
  2. G. Hoglund and G. McGraw, Exploiting Software, Addison- Wesley, 2004.
  3. Jones, C., Software Assessments, Benchmarks, and Best Practices. 2000, Reading, MA: Addison-Wesley. 659.
  4. Jacquith, A., The Security of Applications: Not All Are Created Equal. 2002, @Stake Research. p. 12.
  5. SANS Institute, The Twenty Most Critical Internet Security Vulnerabilities (Updated) ~ The Experts Consensus Version 6.01. 2005.
  6. Bishop, M. and S. Engle. The Software Assurance CBK and University Curricula. in Proceedings of the 10th Colloquium for Information Systems Security Education. 2006. University of Maryland, Adelphi, MD.
  7. Conklin, W.A. Bottom-Up meets Top-Down: A new Paradigm for Software Engineering Instruction. In Proceedings of the 10th Colloquium for Information Systems Security Education. 2006. University of Maryland, University Collage, Adelphi, MD.
  8. Conklin, W.A., Personal Communication: Discussion on secure coding practices with graduate students and former students, W.A. Conklin, Editor. 2005: San Antonio, TX.
  9. Bloom, B.S., Taxonomy of Educational Objectives, Handbook I: The Cognitive Domain. 1956, New York: David McKay Co Inc.
  10. Howard, M., D. LeBlanc, and J. Viega, 19 Deadly Sins of Software Security 2005: McGraw-Hill Osborne Media. 304.
  11. Howard, M. and D.C. LeBlanc, Writing Secure Code. Second Edition ed. 2002: Microsoft Press. 650.
  12. Institute, S.E., Build Security In. 2006, Strategic Initiatives Branch of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS) https:// buildsecurityin.uscert. gov/portal/.
  13. Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C. 1995: Wiley.784.
  14. Schneier, B., Secrets and Lies: Digital Security in a Networked World 2004: Wiley. 448.
Index Terms

Computer Science
Information Sciences

Keywords

Enhance Software Software Development