A Systematic Review of Software Security Issues Associated With Agile Software Development
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Main aim of this research is to review various software security issues associated with agile software development. Software security issues which are considered are types of design and code changes, lack of documentation, schedule delay and change of requirements through prior literature review. All software security issues associated with agile software development cannot be solved completely but can safeguard and avoid to certain extent. It can be stated that documentation issue can be rectified through giving more attention by highly experienced professional. It can be suggested that scheduled delay and change of requirements can be rectified through proper planning and implementation of the project. Flaws in the design can be rectified by proper communication and discussion among the members in the team. This research adopts only secondhanded data or secondary data. In future this work can be expanded by collected primary source of data through quantitative approach among various investigators.
Authors and Affiliations
Prof. Manisha Tijare , Prof. Suman Tanwar , Prof. Seema Patil
The Effect Of Varying Key Length On A Vigenère Cipher
Abstract: Vigenère cipher is one of the polyalphabetic substitution ciphers. Its weakness is the key repetition.To overcome this weakness there are many researchesgoing on to modify the key generation. In this pape...
Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification
Abstract: For the privacy and security of data stored in data storage a new Two Layer Encryption (TLE) approach is developed. This technique performs an encryption at two layers based on some ACP(Access Control Pol...
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate messagefrom u...
Foreign Direct Investment (FDI) In Indian Service Sector-A Study of Post Liberalization
THD Reduction in Multilevel Inverters Using Real-Time Algorithm
Multilevel inverters have been widely applied industries. A family of optimal puisewidth modulation (PWM) methods for multilevel inverters, such as step modulation, can generate output voltage with less harmonic...