The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Measuring Security: A Step Towards Enhancing Security of System
|
Author(s): Shruti Jaiswal (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India)and Daya Gupta (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India)
Copyright: 2018
Volume: 10
Issue: 1
Pages: 26
Source title:
International Journal of Information Systems in the Service Sector (IJISSS)
Editor(s)-in-Chief: John Wang (Montclair State University, USA)
DOI: 10.4018/IJISSS.2018010103
Purchase
|
Abstract
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development. Efforts were made in developing methods, methodologies, and tools to handle security issues. Various methods are present in the literature for eliciting, analyzing and prioritizing the security requirements. During the design phase based on prioritized requirements, environment parameters and attribute a suitable security algorithm mainly cryptography algorithms are identified. Then a question arises how to test the effectiveness of chosen algorithm? Therefore, as an answer to the issue in this paper, a process for Security Testing is presented that evaluates the selected security algorithms. Evaluation is done by generating the test scenarios for functionalities using sequence diagram representing the threats at vulnerable points. Then, checking the mitigation of potential threats at identified vulnerable points. A security index is generated which shows the effectiveness of deployed/ chosen security algorithm. The process ends with the generation of a test report depicting the testing summary. For a clear understanding of the process, the proposal is illustrated with a case study of the cloud storage as a service model.
Related Content
Yuan Ren.
© 2024.
8 pages.
|
Hadeel Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid.
© 2024.
19 pages.
|
Anna M. Segooa, Billy M. Kalema.
© 2024.
27 pages.
|
Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan.
© 2024.
19 pages.
|
Jon A. Chilingerian, Mitchell P. V. Glavin.
© 2024.
27 pages.
|
Osama R. S. Ramadan, Mohamed Yasin I. Afifi, Ahmed Yahya.
© 2024.
19 pages.
|
Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav, Kwok Tai Chui.
© 2024.
30 pages.
|
|
|