Vakkalagadda Aishwarya, SaiVishal Pediredla, Batchu Radhika, Bhumula Vasanthi, K. Padmanaban, A. Velmurugan
{"title":"将安全方法纳入软件开发生命周期过程(SDLC)","authors":"Vakkalagadda Aishwarya, SaiVishal Pediredla, Batchu Radhika, Bhumula Vasanthi, K. Padmanaban, A. Velmurugan","doi":"10.1109/ICCCI56745.2023.10128620","DOIUrl":null,"url":null,"abstract":"As software usage increases and updates, Software development requires several essential elements, including industry security. As vulnerabilities are exploited, we’ve witnessed an upsurge in the demand for securities. There are many various reasons why security is not effectively maintained in software development processes, thuswe have seen some approaches like traditional security, CllCD, and robust security to make sure security is implemented right from the start rather than after process development. The various tools in this study were used to discuss various security implementation methods, and this discussion may be useful for examining various software","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Incorporating of Security Methods into the Software Development Lifecycle Process (SDLC)\",\"authors\":\"Vakkalagadda Aishwarya, SaiVishal Pediredla, Batchu Radhika, Bhumula Vasanthi, K. Padmanaban, A. Velmurugan\",\"doi\":\"10.1109/ICCCI56745.2023.10128620\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As software usage increases and updates, Software development requires several essential elements, including industry security. As vulnerabilities are exploited, we’ve witnessed an upsurge in the demand for securities. There are many various reasons why security is not effectively maintained in software development processes, thuswe have seen some approaches like traditional security, CllCD, and robust security to make sure security is implemented right from the start rather than after process development. The various tools in this study were used to discuss various security implementation methods, and this discussion may be useful for examining various software\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128620\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128620","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Incorporating of Security Methods into the Software Development Lifecycle Process (SDLC)
As software usage increases and updates, Software development requires several essential elements, including industry security. As vulnerabilities are exploited, we’ve witnessed an upsurge in the demand for securities. There are many various reasons why security is not effectively maintained in software development processes, thuswe have seen some approaches like traditional security, CllCD, and robust security to make sure security is implemented right from the start rather than after process development. The various tools in this study were used to discuss various security implementation methods, and this discussion may be useful for examining various software