IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Measuring Security: A Step Towards Enhancing Security of System

Measuring Security: A Step Towards Enhancing Security of System
View Sample PDF
Author(s): Shruti Jaiswal (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India)and Daya Gupta (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India)
Copyright: 2018
Volume: 10
Issue: 1
Pages: 26
Source title: International Journal of Information Systems in the Service Sector (IJISSS)
Editor(s)-in-Chief: John Wang (Montclair State University, USA)
DOI: 10.4018/IJISSS.2018010103

Purchase

View Measuring Security: A Step Towards Enhancing Security of System on the publisher's website for pricing and purchasing information.

Abstract

The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development. Efforts were made in developing methods, methodologies, and tools to handle security issues. Various methods are present in the literature for eliciting, analyzing and prioritizing the security requirements. During the design phase based on prioritized requirements, environment parameters and attribute a suitable security algorithm mainly cryptography algorithms are identified. Then a question arises how to test the effectiveness of chosen algorithm? Therefore, as an answer to the issue in this paper, a process for Security Testing is presented that evaluates the selected security algorithms. Evaluation is done by generating the test scenarios for functionalities using sequence diagram representing the threats at vulnerable points. Then, checking the mitigation of potential threats at identified vulnerable points. A security index is generated which shows the effectiveness of deployed/ chosen security algorithm. The process ends with the generation of a test report depicting the testing summary. For a clear understanding of the process, the proposal is illustrated with a case study of the cloud storage as a service model.

Related Content

Yuan Ren. © 2024. 8 pages.
Hadeel Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid. © 2024. 19 pages.
Anna M. Segooa, Billy M. Kalema. © 2024. 27 pages.
Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan. © 2024. 19 pages.
Jon A. Chilingerian, Mitchell P. V. Glavin. © 2024. 27 pages.
Osama R. S. Ramadan, Mohamed Yasin I. Afifi, Ahmed Yahya. © 2024. 19 pages.
Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav, Kwok Tai Chui. © 2024. 30 pages.
Body Bottom