June 2013
SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p13
The article presents two opposing views on whether software developers are not incentivized to improve security. One side believes that investing in secure software detracts from the functionality of the software while seemingly not making the users much safer. The industry is described to be not yet mature with the people stepping in with regulation prematurely. Putting resources on compliance with ineffective standards is suggested to be a waste.


Related Articles

  • THE SC MAGAZINE POLL.  // SC Magazine: For IT Security Professionals (15476693);Jul2013, Vol. 24 Issue 7, p13 

    A graph is presented that shows the results of a poll to determine whether software vendors approved the release of details about a particular flaw in their product by researchers, with 62.96 percent agreeing while 37.04 percent disagreed.

  • Software Security Requirements Gathering Instrument. Jain, Smriti; Ingle, Maya // International Journal of Advanced Computer Science & Application;Jul2011, Vol. 2 Issue 7, p116 

    Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes...

  • Bug Bounties Fail to Find Many Software Flaws, Researchers Say. Lemos, Robert // eWeek;4/20/2015, p1 

    The article the research conducted by economics and policy researchers, on the appropriate way to disclose flaws in software development and improve software security. It mentions that the research suggests paying security specialists to privately disclose security bugs to the software developer...

  • Software Security Improvement with Aspect--Oriented Software Development. Kharb, Latika; Singh, Rajender // ICFAI Journal of Systems Management;Feb2008, Vol. 6 Issue 1, p7 

    Aspect-Oriented Software Development (AOSD), being one of the latest trends in software engineering, has made the software security deployment more centralized by providing the inbuilt ability of a system to respond to software security threats. Previously, software development was highly prone...

  • Too Much Information Static Analysis To The Rescue. Siman, Maty // Software World;May2013, Vol. 44 Issue 3, p23 

    The article discusses advantages of static analysis tools which have been developed for assessment of security systems for protection of data and software. It presents information on tool developed by Checkmarx, which is a provider of code analysis tools, static code analysis and software...

  • INTEGRATING SOFTWARE ASSURANCE INTO THE SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC). Dawson, Maurice; Burrell, Darrell Norman; Rahim, Emad; Brewster, Stephen // Journal of Information Systems Technology & Planning;Dec2010, Vol. 3 Issue 6, p49 

    This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process...

  • Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework. Mir, Irshad Ahmad; Quadri, S. M. K. // International Journal of Computer Network & Information Security;Oct2012, Vol. 4 Issue 11, p21 

    Evaluating the security of software systems is a complex problem for the research communities due to the multifaceted and complex operational environment of the system involved. Many efforts towards the secure system development methodologies like secSDLC by Microsoft have been made but the...

  • A Framework of Cloud service Quality Evaluation System - Focusing on Security Quality Evaluation. Byung Do Chung; Hangoo Jeon; Kwang-Kyu Seo // International Journal of Security & Its Applications;2014, Vol. 8 Issue 4, p41 

    Cloud service, a new internet business, is expected to lead the innovation of paradigm and continuously grow as a future growth engine, but various barriers are occurring that hinder the vitalization of the business such as security, cost, backup, performance and reliability related to the...

  • Enhancing Software Secureness in Public ICT Applications. Raju, C. K.; Bhadoria, P. B. S. // International Journal of Computer Applications;Jan2012, Vol. 37, p23 

    Issues related to security and privacy of information under processing have been topics of great public interest. A perception of existence of an insecure channel of communication is usually created, which needed attention by experts. Most discussions also assume, among other issues, neutrality...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics