SECURE SOFTWARE DEVELOPMENT BY INTEGRATING SECURITY ACTIVITIES WITH AGILE ACTIVITIES.

  • Sushil Kumar et al.

Abstract

Agility among the software is looking for significance during the advancement stage, as it advances versatile arranging, gradual and transformative improvement with numerous different highlights that are lightweight in nature. The software developed with agile methodology are not secure, because of security is not the phase of in software development models. Therefore security has be inserted externally to the software development model to make the software secure. Security is one of the significant issues in the present profoundly coordinated programming improvement industry. More underscore is on to create a safe programming, in order to limit the measure of hazard and harm brought about by the product utilizing the lithe advancement approach. Creating secure programming with high deft qualities is constantly a hard undertaking to do in view of substantial weight nature of security exercises. In this postulation a novel methodology is proposed by which security exercises which are not the piece of programming improvement models, can be integrated with agile activities. The embodiment of the security activities and agile activities is based upon the fact that as the security activities are heavyweight which may reduce the agility i.e. the measure of rapidness, incremental delivery of the software etc. of the agile methodology is in such a manner that the agility of the agile activities are affected  least. For this least impact in nimbleness this methodology the mean readiness estimation of the two exercises for example deft just as security are determined dependent on the different light-footed attributes. The different factors, for example, cost, time, repeat, benefits influencing the deftness of the action are additionally considered. Based upon the importance of these factors a Influencing Factor Value Table (IFVT) are also created for both the activities. By using fuzzy value compatibility table (FVCT), extend of compatibility of embodiment of both the activities is estimated based upon the observations of various software experts. For the filling of FVCT  fuzzy value are used instead of binary value keeping in mind the fact that it’s not possible to decide the embodiment on binary value yes or no, true or false means embodiment is possible or not possible. The degree of embodiment is up to certain extend that can only be revealed with the help of fuzzy values not with the binary values. This whole approach for integration of securities activities with agile methodologies is monitored with the help of GUI based framework.

Published
2019-11-21
How to Cite
et al., S. K. (2019). SECURE SOFTWARE DEVELOPMENT BY INTEGRATING SECURITY ACTIVITIES WITH AGILE ACTIVITIES. International Journal of Advanced Science and Technology, 28(15), 780 - 791. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/1984
Section
Articles