Software Security: A Risk Taxonomy

Abstract

The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has proved not to be an easy mission. As many organizations have discovered, the implementation of software’s systems can be an enormous disaster unless the process is managed cautiously. By calculating and minimizing the major business risks in the first illustration, the scene can be set for the successful performance of software’s organization. Almost every software controlled system faces risk from potential adversaries. Software engineers must be cognizant of these security risk and engineer systems with probable defenses, as still delivering value to customers is priority of an organization.Software security risk management and security assessments essentials reproduces several influences. The maximum documentation arrival on security holders encloses the value to customers. In this paper there is a focus on another face of software security risk analysis which connects to arranging software in the market that assists as an intermediate between a software provider, society and its clients.

Authors and Affiliations

Kavita Sahu , Rajshree

Keywords

Related Articles

A New Multi-hop approach for sensing coverage in wireless sensor network

Sensor networks provide a strong combination of distributed sensing, computing and communication. Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied wi...

Recent Developments in Superresolution

Super resolution imaging refers to inferring the missing high resolution image from low resolution image(s). Super resolution methods are generally classified into reconstruction based and learning based methods. This pa...

Preventing mitm attack in simple secure pairing in Bluetooth

Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its commu...

Energy Cost and QoS based management of Data Centers Resources in Cloud Computing

Cloud computing is the evolutionary step to transform a large part of the Information and Communication Technology industry. It is the result of the efforts to provide the opportunity to focus on hardware and software co...

A Novel Semi-Supervised Machine Learning Technique for Real-Time Network Traffic Classifications

Traffic classification technique is an essential tool for network and system security in the complex environments such as cloud computing based environment. The state-of-the-art traffic classification methods aim to take...

Download PDF file
  • EP ID EP132318
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

Kavita Sahu, Rajshree (2015). Software Security: A Risk Taxonomy. International Journal of Computer Science & Engineering Technology, 6(2), 36-41. https://europub.co.uk/articles/-A-132318