Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems....
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Centro Latinoamericano de Estudios en Informática
2016-12-01
|
Series: | CLEI Electronic Journal |
Subjects: | |
Online Access: | http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429 |
id |
doaj-2b661147bb814f949ad5e189e3ab58f9 |
---|---|
record_format |
Article |
spelling |
doaj-2b661147bb814f949ad5e189e3ab58f92020-11-24T22:01:26ZengCentro Latinoamericano de Estudios en InformáticaCLEI Electronic Journal0717-50002016-12-0119310.19153/cleiej.19.3.5Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping StudiesPaulina Silva0René Noël1Santiago Matalonga2Hernán Astudillo3Diego Gatica4Gastón Marquez5Universidad Técnica Federico Santa María, ChileUniversidad de Valparaíso, ChileUniversidad ORT Uruguay, UruguayUniversidad Tecnica Federico Santa MariaUniversidad Técnica Federico Santa María, ChileUniversidad Técnica Federico Santa María, Chile Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM) have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC); while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals. http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429Security ThreatsSecure Software DevelopmentSystematic Mapping study |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Paulina Silva René Noël Santiago Matalonga Hernán Astudillo Diego Gatica Gastón Marquez |
spellingShingle |
Paulina Silva René Noël Santiago Matalonga Hernán Astudillo Diego Gatica Gastón Marquez Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies CLEI Electronic Journal Security Threats Secure Software Development Systematic Mapping study |
author_facet |
Paulina Silva René Noël Santiago Matalonga Hernán Astudillo Diego Gatica Gastón Marquez |
author_sort |
Paulina Silva |
title |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies |
title_short |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies |
title_full |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies |
title_fullStr |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies |
title_full_unstemmed |
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies |
title_sort |
software development initiatives to identify and mitigate security threats - two systematic mapping studies |
publisher |
Centro Latinoamericano de Estudios en Informática |
series |
CLEI Electronic Journal |
issn |
0717-5000 |
publishDate |
2016-12-01 |
description |
Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM) have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC); while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.
|
topic |
Security Threats Secure Software Development Systematic Mapping study |
url |
http://www.clei.org/cleiej-beta/index.php/cleiej/article/view/429 |
work_keys_str_mv |
AT paulinasilva softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies AT renenoel softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies AT santiagomatalonga softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies AT hernanastudillo softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies AT diegogatica softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies AT gastonmarquez softwaredevelopmentinitiativestoidentifyandmitigatesecuritythreatstwosystematicmappingstudies |
_version_ |
1725839546998849536 |