Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems....

Full description

Bibliographic Details
Main Authors: Paulina Silva, René Noël, Santiago Matalonga, Hernán Astudillo, Diego Gatica, Gastón Marquez
Format: Article
Language:English
Published: Centro Latinoamericano de Estudios en Informática 2016-12-01
Series:CLEI Electronic Journal
Subjects:
Online Access:http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429
id doaj-2b661147bb814f949ad5e189e3ab58f9
record_format Article
spelling doaj-2b661147bb814f949ad5e189e3ab58f92020-11-24T22:01:26ZengCentro Latinoamericano de Estudios en InformáticaCLEI Electronic Journal0717-50002016-12-0119310.19153/cleiej.19.3.5Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping StudiesPaulina Silva0René Noël1Santiago Matalonga2Hernán Astudillo3Diego Gatica4Gastón Marquez5Universidad Técnica Federico Santa María, ChileUniversidad de Valparaíso, ChileUniversidad ORT Uruguay, UruguayUniversidad Tecnica Federico Santa MariaUniversidad Técnica Federico Santa María, ChileUniversidad Técnica Federico Santa María, Chile Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM) have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC); while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals. http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429Security ThreatsSecure Software DevelopmentSystematic Mapping study
collection DOAJ
language English
format Article
sources DOAJ
author Paulina Silva
René Noël
Santiago Matalonga
Hernán Astudillo
Diego Gatica
Gastón Marquez
spellingShingle Paulina Silva
René Noël
Santiago Matalonga
Hernán Astudillo
Diego Gatica
Gastón Marquez
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
CLEI Electronic Journal
Security Threats
Secure Software Development
Systematic Mapping study
author_facet Paulina Silva
René Noël
Santiago Matalonga
Hernán Astudillo
Diego Gatica
Gastón Marquez
author_sort Paulina Silva
title Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
title_short Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
title_full Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
title_fullStr Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
title_full_unstemmed Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
title_sort software development initiatives to identify and mitigate security threats - two systematic mapping studies
publisher Centro Latinoamericano de Estudios en Informática
series CLEI Electronic Journal
issn 0717-5000
publishDate 2016-12-01
description Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM) have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC); while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.
topic Security Threats
Secure Software Development
Systematic Mapping study
url http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429
work_keys_str_mv AT paulinasilva softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
AT renenoel softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
AT santiagomatalonga softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
AT hernanastudillo softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
AT diegogatica softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
AT gastonmarquez softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies
_version_ 1725839546998849536