Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Secure Software Development Techniques and Challenges in their Practical Application

Version 1 : Received: 19 September 2020 / Approved: 20 September 2020 / Online: 20 September 2020 (14:48:42 CEST)

How to cite: Ee, S. J.; Tong, Y. H.; Ibrahim, A. I.; Zahra, F. Secure Software Development Techniques and Challenges in their Practical Application. Preprints 2020, 2020090478. https://doi.org/10.20944/preprints202009.0478.v1 Ee, S. J.; Tong, Y. H.; Ibrahim, A. I.; Zahra, F. Secure Software Development Techniques and Challenges in their Practical Application. Preprints 2020, 2020090478. https://doi.org/10.20944/preprints202009.0478.v1

Abstract

The main focus of this paper is to analyze and discuss the secure software development practices currently being adopted in the industry along with their significance, as well as to identify the challenges faced by developers when undertaking measures and techniques in writing secure software. It is a well-known fact that software security has been the top priority of many software companies such as Google and Facebook to thwart attackers and protect user data in this world full of cybercriminals. Understanding how most software companies in the industry operate to ensure security helps developers to identify strengths and weaknesses in their current security frameworks. Hence, by researching into previous literature and papers that are relevant to the topic and by conducting an interview with a professional in the field, this paper provides insights on the most popular secure software development framework and practices in the world as well as problems faced by companies when adopting these practices. Several security practices and activities that are required to create secure software are discovered alongside the problems that arise when companies are trying to apply these practices. This paper also proposes a few solutions that can be used to resolve these problems, which can be easily understood and implemented by software companies to transition into a truly secure software development environment.

Keywords

Software development; SDLC; Secure software development challenges; security development lifecycle

Subject

Computer Science and Mathematics, Software

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.