Softwares have become an integral part of everyday life. Every day, millions of people perform transaction through various applications run by these softwares as internet, ATM, mobile phone, email etc. Softwares are used by people bearing in mind that it is reliable and can be trusted upon and the operations they perform is secure. Now, if these softwares have ensembled security holes, then how can they be safe for use? Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. Because of the limitation of budget and release time of the software into the market, many developers consider security as an afterthought thus resulting in poor quality software. In the early days, software security was only considered as part of software testing but, later on, it has been experienced that security is not an afterthought in case of software development[16][17]. Various aspects of securing the software by enforcing security in various phases of software development life cycle have been looked upon by referencing novel work by various authors on security in SDLC.
[1]
Jeffrey L. Hieb,et al.
Cyber security risk assessment for SCADA and DCS networks.
,
2007,
ISA transactions.
[2]
Srinivasa Kumar Devireddy,et al.
HAND WRITTEN CHARACTER RECOGNITION USING BACK PROPAGATION NETWORK
,
2009
.
[3]
Jeannette M. Wing.
A call to action look beyond the horizon
,
2003,
IEEE Security & Privacy Magazine.
[4]
Gary McGraw,et al.
Software Security: Building Security In
,
2006,
2006 17th International Symposium on Software Reliability Engineering.
[5]
Nancy R. Mead,et al.
Software Security Engineering: A Guide for Project Managers
,
2004
.
[6]
S. K. Pandey,et al.
Software Security Rules, SDLC Perspective
,
2009,
ArXiv.
[7]
Gary McGraw,et al.
Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software
,
2002,
IEEE Softw..
[8]
Michael Gegick,et al.
On the design of more secure software-intensive systems by use of attack patterns
,
2007,
Inf. Softw. Technol..