Security considerations for the spiral development model
Loye Lynn Ray
International Journal of Information Management, 2013, vol. 33, issue 4, 684-686
Abstract:
Security measures have been well established within the waterfall development life cycle model. However, more software projects are using the spiral development life cycle model. Software developers and project managers can easily forget about adapting security measures. The spiral model uses iterative steps that can create changes in each phase of software development process. This will challenge security to ensure the application has few flaws or vulnerabilities that could be exploited. Failure to impose the right security measures at each of these phases can open up vulnerabilities for hackers to exploit and prove costly in patching. This paper will explore areas where security can be engaged within each iteration step of the spiral development model. This way security can continue protection of the software product as it becomes ready for deployment. The paper will help organizations realize where to deploy security measures to reduce vulnerabilities in the software application.
Keywords: Spiral development life cycle; Software development; Risk (search for similar items in EconPapers)
Date: 2013
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0268401213000418
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:ininma:v:33:y:2013:i:4:p:684-686
DOI: 10.1016/j.ijinfomgt.2013.03.003
Access Statistics for this article
International Journal of Information Management is currently edited by Yogesh K. Dwivedi
More articles in International Journal of Information Management from Elsevier
Bibliographic data for series maintained by Catherine Liu ().