Software Security: A Risk Taxonomy

Abstract

The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has proved not to be an easy mission. As many organizations have discovered, the implementation of software’s systems can be an enormous disaster unless the process is managed cautiously. By calculating and minimizing the major business risks in the first illustration, the scene can be set for the successful performance of software’s organization. Almost every software controlled system faces risk from potential adversaries. Software engineers must be cognizant of these security risk and engineer systems with probable defenses, as still delivering value to customers is priority of an organization.Software security risk management and security assessments essentials reproduces several influences. The maximum documentation arrival on security holders encloses the value to customers. In this paper there is a focus on another face of software security risk analysis which connects to arranging software in the market that assists as an intermediate between a software provider, society and its clients.

Authors and Affiliations

Kavita Sahu , Rajshree

Keywords

Related Articles

Krill Herd Clustering Algorithm using DBSCAN Technique

The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...

A Review on Driver Drowsiness Detection Techniques

Number of accidents during driving is increasing day by day and drowsy driving has been implicated as a causal factor in many accidents. Goal of driver drowsiness detection systems is to reduce these accidents. It has be...

Using Queuing theory the performance measures of cloud with infinite servers

Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...

Mobicast Routing Protocol with Multiple Sink Zone Formation in Underwater Sensor Networks

In this paper, we groping the multiple Sink Zone formation Mobicast routing protocol for 3-D Underwater Sensor Networks (USNs). The 3-D USNs consists a number of sensor nodes which are deployed in 3-D environment and Sen...

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the...

Download PDF file
  • EP ID EP132318
  • DOI -
  • Views 134
  • Downloads 0

How To Cite

Kavita Sahu, Rajshree (2015). Software Security: A Risk Taxonomy. International Journal of Computer Science & Engineering Technology, 6(2), 36-41. https://europub.co.uk/articles/-A-132318