Web development evolution: the business perspective on security

Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and defend accountability. Research indicates that a significant portion of the financial losses is due to straight forward software design errors. Security should be addressed throughout the application development process via an independent methodology containing customizable components. The methodology is designed to integrate with an organization’s existing software development processes while providing structure to implement secure applications, helping companies mitigate hard and soft costs.

[1]  Yogesh Deshpande Web Engineering Curriculum: A Case Study of an Evolving Framework , 2004, ICWE.

[2]  Lynn A. Karoly,et al.  Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.

[3]  Kenneth R. van Wyk,et al.  SECURE CODING PRINCIPLES & PRACTICES , 2003 .

[4]  D. Stephens The Sarbanes‐Oxley Act , 2005 .

[5]  Christopher L. Tucci,et al.  Internet Business Models and Strategies , 2000 .

[6]  Robert L. Glass,et al.  Facts and fallacies of software engineering , 2002 .

[7]  San Murugesan Web engineering , 1999, LINK.

[8]  Rick Freedman The eConsultant: Guiding Clients to Net Success , 2001 .

[9]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[10]  Glen L. Urban,et al.  Strategies for E-Business Success , 2001 .

[11]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[12]  Ray Welland,et al.  Web development evolution: the assimilation of Web engineering security , 2005, Third Latin American Web Congress (LA-WEB'2005).

[13]  P. D. Howard The Security Policy Life Cycle: Functions and Responsibilities , 2002 .

[14]  Peter Fingar,et al.  The Death of "e" and the Birth of the Real New Economy : Business Models, Technologies and Strategies for the 21st Century , 2001 .

[15]  Susan Hansche,et al.  Official (ISC)2 Guide to the CISSP Exam , 2003 .

[16]  Rahul Telang,et al.  Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.

[17]  Juanita Ellis,et al.  The Internet Security Guidebook: From Planning to Deployment , 2001 .