Challenges and experiences with applying microsoft threat modeling in agile development projects
The goal of secure software engineering is to create software that keeps performing as
intended even when exposed to attacks. Threat modeling is considered to be a key activity …
intended even when exposed to attacks. Threat modeling is considered to be a key activity …
[HTML][HTML] Influencing the security prioritisation of an agile software development project
Software security is a complex topic, and for development projects it can be challenging to
assess what security is necessary and cost-effective. Agile Software Development (ASD) …
assess what security is necessary and cost-effective. Agile Software Development (ASD) …
Integrating security and privacy in software development
As a consequence to factors such as progress made by the attackers, release of new
technologies and use of increasingly complex systems, and threats to applications security …
technologies and use of increasingly complex systems, and threats to applications security …
Towards agile cybersecurity risk management for autonomous software engineering teams
H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
In this study, a framework was developed, based on a literature review, to help managers
incorporate cybersecurity risk management in agile development projects. The literature …
incorporate cybersecurity risk management in agile development projects. The literature …
Measuring secure coding practice and culture: A finger pointing at the moon is not the moon
Software security research has a core problem: it is impossible to prove the security of
complex software. A low number of known defects may simply indicate that the software has …
complex software. A low number of known defects may simply indicate that the software has …
IoTSM: an end-to-end security model for IoT ecosystems
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new
technologies. Alongside this development, most IoT devices are easy to compromise, as …
technologies. Alongside this development, most IoT devices are easy to compromise, as …
Privacy oriented software development
Threats to applications security are continuously evolving thanks to factors such as progress
made by the attackers, release of new technologies, use of increasingly complex systems. In …
made by the attackers, release of new technologies, use of increasingly complex systems. In …
Infiltrating security into development: exploring the world's largest software security study
C Weir, S Migues, M Ware, L Williams - … of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Recent years have seen rapid increases in cybercrime. The use of effective software security
activities plays an important part in preventing the harm involved. Objective research on …
activities plays an important part in preventing the harm involved. Objective research on …
Agile team members perceptions on non-functional testing: influencing factors from an empirical study
CR Camacho, S Marczak… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Non-functional requirements define the overall qualities or attributes of a system. Although
important, they are often neglected for many reasons, such as pressure of time and budget …
important, they are often neglected for many reasons, such as pressure of time and budget …
[HTML][HTML] Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions
Background: Recent years have seen a surge in cyber-attacks, which can be prevented or
mitigated using software security activities. OWASP SAMM is a maturity model providing a …
mitigated using software security activities. OWASP SAMM is a maturity model providing a …