Abstract

This paper takes a deeper look at data breach, its causes and the linked vulnerability aspects in the application development lifecycle. Further, the Vulnerabilities are mapped to the software development life cycle (SDLC) involving requirement elicitation, design, development, testing and deployment phases. Being aware of exact SDLC life cycle where the vulnerabilities are injected, suitable security practices (countermeasures) can be adopted in delivery methodology, which can control the eventual data breaches and safeguard the application from security perspective. Our research focuses on Evolution of Vulnerabilities through the application development life cycle, and we have leveraged “Inverted Tree Structure/Attack Tree” and “Affinity Principles” to map the vulnerabilities to right Software Development Life Cycle.

Highlights

  • In the new age world of software delivery, Agile methodology is the most popular and widely adopted approach

  • The Vulnerabilities are mapped to the software development life cycle (SDLC) involving requirement elicitation, design, development, testing and deployment phases

  • Being aware of exact SDLC life cycle where the vulnerabilities are injected, suitable security practices can be adopted in delivery methodology, which can control the eventual data breaches and safeguard the application from security perspective

Read more

Summary

Introduction

In the new age world of software delivery, Agile methodology is the most popular and widely adopted approach. Inspite of several best practices and proven techniques advocated by these application delivery methodologies, data breach is still a common concern across the globe. Data breach cases in the year 2018 reached all time high with a greater number of well-reputed organizations coming under threat, with their customer information being compromised. Being aware of exact SDLC life cycle where the vulnerabilities are injected, suitable security practices can be adopted in delivery methodology, which can control the eventual data breaches and safeguard the application from security perspective. Few high-profile data breach incidents in recent past: As per FireEye report, Communications, Media and Entertainment (CME) industry alone has found 91% of breach caused due to failure in conventional defense mechanism. T-Mobile, Facebook & Reddit were few more high-tech industries segments affected by data breach but were either reluctant to disclose the scale or were late in disclosing

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.