Software Security: A Risk Taxonomy

Abstract

The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has proved not to be an easy mission. As many organizations have discovered, the implementation of software’s systems can be an enormous disaster unless the process is managed cautiously. By calculating and minimizing the major business risks in the first illustration, the scene can be set for the successful performance of software’s organization. Almost every software controlled system faces risk from potential adversaries. Software engineers must be cognizant of these security risk and engineer systems with probable defenses, as still delivering value to customers is priority of an organization.Software security risk management and security assessments essentials reproduces several influences. The maximum documentation arrival on security holders encloses the value to customers. In this paper there is a focus on another face of software security risk analysis which connects to arranging software in the market that assists as an intermediate between a software provider, society and its clients.

Authors and Affiliations

Kavita Sahu , Rajshree

Keywords

Related Articles

A Survey on Quality of Service and Congestion Control

Several techniques have been developed to meet the demand for faster and more efficient access to the Internet. Different applications have different networking requirements. For example, realtime interactive voice requi...

TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS

Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...

An overview of Object Oriented Metrics A complete Survey

Object oriented metrics have become more important in software engineering field. They are used to measure software quality and to estimate the cost, to enhance the reliability, maintainability and effort of software pro...

Generation of Addition Chain using Deterministic Division Based Method

Efficiency of a cryptosystem depends not only on the security it provides, but also it increases the operational speed thereby it reduces the time taken for encryption and decryption. In most numbertheoretic cryptographi...

THE IMPLEMENTATION OF PROGRAMMABLE WIRELESS ROUTER USING JAVA

Nowadays available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If th...

Download PDF file
  • EP ID EP132318
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Kavita Sahu, Rajshree (2015). Software Security: A Risk Taxonomy. International Journal of Computer Science & Engineering Technology, 6(2), 36-41. https://europub.co.uk/articles/-A-132318