{"title":"Software Security: Role in SDLC","authors":"Shanky Goyal, Navleen Kaur, Sachin Majithia","doi":"10.46860/CGCIJCTR.2021.06.31.205","DOIUrl":null,"url":null,"abstract":"This research emphasizes mainly on the need for software security. Softwares are developing at a faster pace so it is required to impose security on them in order to secure them from cybercrimes. Softwares have been facing problems by the attackers who are constantly kept on breaching the Data. Therefore this survey comprises the phases that are an integral part of the SDLC from the security point of views such as Design and testing phase. Moreover, it quests upon the data related to threats and attacks. Not only this, but it also involves the prerequisites that have to be determined before developing the software like, what are the approaches that should be followed and what are the best suitable designs to secure the software?","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CGC International Journal of Contemporary Technology and Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46860/CGCIJCTR.2021.06.31.205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This research emphasizes mainly on the need for software security. Softwares are developing at a faster pace so it is required to impose security on them in order to secure them from cybercrimes. Softwares have been facing problems by the attackers who are constantly kept on breaching the Data. Therefore this survey comprises the phases that are an integral part of the SDLC from the security point of views such as Design and testing phase. Moreover, it quests upon the data related to threats and attacks. Not only this, but it also involves the prerequisites that have to be determined before developing the software like, what are the approaches that should be followed and what are the best suitable designs to secure the software?