Affiliation:
1. BBA University
2. Prince Sultan University
Abstract
Hackers and other cyber attackers remain fearless concerning the mitigation mechanisms that have evolved for addressing security over the past few years. Cyber attacks are on the rise and countless security breaches take place daily. It is believed that cybercrime in its various forms will cost the world $6tr per year by 2021. 1 It has become essential that software companies evaluate their businesses to identify application security needs, strategies and weaknesses. Establishing a security policy to safeguard their software applications has become an urgent need. Vulnerable applications are the bane of the software industry. Software companies need to make sure that their developers write more secure code, but developers struggle with this issue. To encourage developers to write secure source code, there is a need to integrate the whole process of scanning, detecting and mitigating security vulnerabilities and flaws during code analysis. Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar and Raees Ahmad Khan propose an integrated and prescriptive framework intended to identify and mitigate vulnerabilities and provide suggestions for writing more secure code.
Subject
Law,General Computer Science
Reference26 articles.
1. ‘Top German politicians affected in major data breach’; The Institution of Engineering & Technology; 4 Jan 2019: https://eandt.theiet.org/content/articles/2019/01/top-german-politicians-affected-in-major-data-breach/ accessed January 2019
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献