Skip to main navigation menu Skip to main content Skip to site footer

Peer Reviewed Article

Vol. 3 (2018)

Security-Centric Software Development: Integrating Secure Coding Practices into the Software Development Lifecycle

Published
2018-02-02

Abstract

This study looks into how secure coding methods can be incorporated into the software development lifecycle (SDLC) to support security-centric software development. The principal aims of this study are to evaluate the importance of incorporating secure coding methods, recognize obstacles and hurdles to implementation, investigate the consequences for software security and quality, and suggest policy measures. Using a secondary data-based review methodology, the study looks at scholarly papers, industry reports, and peer-reviewed literature. Key findings highlight the significance of security integration and its associated difficulties, such as resource limitations and compliance requirements. They also highlight the consequences for software quality and security posture and the policy implications, including the need for collaboration and education. The study emphasizes the importance of constructing secure and robust software systems in today's digital landscape by including secure coding standards in the software development life cycle (SDLC).

References

  1. Ande, J. R. P. K., Varghese, A., Mallipeddi, S. R., Goda, D. R., & Yerram, S. R. (2017). Modeling and Simulation of Electromagnetic Interference in Power Distribution Networks: Implications for Grid Stability. Asia Pacific Journal of Energy and Environment, 4(2), 71-80. https://doi.org/10.18034/apjee.v4i2.720
  2. Flora, H. K., Wang, X., Chande, S. V. (2014). An Investigation into Mobile Application Development Processes: Challenges and Best Practices. International Journal of Modern Education and Computer Science, 6(6), 1-9. https://doi.org/10.5815/ijmecs.2014.06.01
  3. Glisson, W. B., Welland, R. (2014). Web Engineering Security (WES) Methodology. Communications of the Association for Information Systems, 34, 71. https://doi.org/10.17705/1CAIS.03471
  4. Goda, D. R. (2016). A Fully Analytical Back-gate Model for N-channel Gallium Nitrate MESFET's with Back Channel Implant. California State University, Northridge. http://hdl.handle.net/10211.3/176151
  5. Maciel, R. S. P., Gomes, R. A., Magalhães, A. P., Silva, B. C., Queiroz, J. P. B. (2013). Supporting Model-driven Development Using a Process-centered Software Engineering Environment. Automated Software Engineering, 20(3), 427-461. https://doi.org/10.1007/s10515-013-0124-0
  6. Mahadasa, R. (2016). Blockchain Integration in Cloud Computing: A Promising Approach for Data Integrity and Trust. Technology & Management Review, 1, 14-20. https://upright.pub/index.php/tmr/article/view/113
  7. Mahadasa, R. (2017). Decoding the Future: Artificial Intelligence in Healthcare. Malaysian Journal of Medical and Biological Research, 4(2), 167-174. https://mjmbr.my/index.php/mjmbr/article/view/683
  8. Mahadasa, R., & Surarapu, P. (2016). Toward Green Clouds: Sustainable Practices and Energy-Efficient Solutions in Cloud Computing. Asia Pacific Journal of Energy and Environment, 3(2), 83-88. https://doi.org/10.18034/apjee.v3i2.713
  9. Mallipeddi, S. R., Goda, D. R., Yerram, S. R., Varghese, A., & Ande, J. R. P. K. (2017). Telemedicine and Beyond: Navigating the Frontier of Medical Technology. Technology & Management Review, 2, 37-50. https://upright.pub/index.php/tmr/article/view/118
  10. Mallipeddi, S. R., Lushbough, C. M., & Gnimpieba, E. Z. (2014). Reference Integrator: a workflow for similarity driven multi-sources publication merging. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). https://www.proquest.com/docview/1648971371
  11. Ormandjieva, O., Khelifi, A., Jololian, L. (2010). Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 83-99. https://doi.org/10.28945/1125
  12. Shuaibu, M. B., Norwawi, M. N., Selamat, M. H., Al-alwani, A. (2015). Systematic Review of Web Application Security Development Model. The Artificial Intelligence Review, 43(2), 259-276. https://doi.org/10.1007/s10462-012-9375-6
  13. Surarapu, P. (2016). Emerging Trends in Smart Grid Technologies: An Overview of Future Power Systems. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 17-24. https://upright.pub/index.php/ijrstp/article/view/114
  14. Surarapu, P. (2017). Security Matters: Safeguarding Java Applications in an Era of Increasing Cyber Threats. Asian Journal of Applied Science and Engineering, 6(1), 169–176. https://doi.org/10.18034/ajase.v6i1.82
  15. Surarapu, P., & Mahadasa, R. (2017). Enhancing Web Development through the Utilization of Cutting-Edge HTML5. Technology & Management Review, 2, 25-36. https://upright.pub/index.php/tmr/article/view/115
  16. Zhang, P., Carey, J., Te'eni, D., Tremaine, M. (2005). Integrating Human-Computer Interaction Development into the Systems Development Life Cycle: A Methodology. Communications of the Association for Information Systems, 15, 29. https://doi.org/10.17705/1CAIS.01529

Similar Articles

11-19 of 19

You may also start an advanced similarity search for this article.