Adaptive Security Activities Selection Model Using Multi-Criteria Decision-Making Methods
-
Published:2024-01-13
Issue:S1
Volume:45
Page:65-78
-
ISSN:0253-7214
-
Container-title:Journal of Advanced Zoology
-
language:
-
Short-container-title:J. Adv. Zool.
Author:
Mazni Mohamed Jakeri ,Mohd Fadzil Hassan ,Aliza Sarlan ,Amirudin Abdul Wahab
Abstract
Adaptive security activities are a list of recommended security activities to be integrated smoothly with the software development life cycle (SDLC) to produce a secure application software. Adaptive security activities are needed due to the emergence of factors and constraints which have been determined as one of the reasons for the underutilisation of security activities implementation, especially in the earlier phase of software development process. Security activities selection models were proposed to select and recommend security activities but the models were focused on certain factors or as a solution for specific constraints, and thus the recommended security activities were not adaptive. Consequently, an adaptive security activities selection (ASAS) model was proposed by combining the factors and constraints faced by the development team in selecting security activities. The model consisted of two integrated multi-criteria decisionmaking (MCDM) methods, namely Analytic Network Process (ANP) and Reference Ideal Method (RIM). ANP was used to prioritise and weight the criteria while RIM was used to measure and evaluate the security activities with the value of constraints in regard to each criterion. To validate the model a case study was performed on four inhouse web application development teams in the Malaysian public sector. The proposed model was able to recommend security activities in the requirement and design phase based on different constraints faced by each of the development teams. The model was adaptive due to its flexibility and ability to change and suit different evolved conditions when recommending the security activities.
Publisher
Auricle Technologies, Pvt., Ltd.
Reference31 articles.
1. Abdullah, L., Chan, W., & Afshari, A. (2018). Application of PROMETHEE method for green supplier selection: a comparative result based on preference functions. Journal of Industrial Engineering International, 0123456789. https://doi.org/10.1007/s40092-018-0289-z 2. Assal, H., & Chiasson, S. (2018). Security in the Software Development Lifecycle. USENIX Symposium on Usable Privacy and Security (SOUPS), 281–296. 3. Bandi, A., Fellah, A., & Bondalapati, H. (2019). Embedding security concepts on introductory programming courses. The Journal of Computing Sciences in Colleges, 34(4), 78–89. 4. Batcheller, A., Fowler, S. C., Cunningham, R., Doyle, D., Jaeger, T., & Lindqvist, U. (2017). Building on the success of building security in. IEEE Security and Privacy, 15(4), 85–87. https://doi.org/10.1109/MSP.2017.3151336 5. Cables, E., Lamata, M. T., & Verdegay, J. L. (2016). RIM-Reference Ideal Method in Multicriteria Decision Making. Information Sciences, 337–338, 1–10. https://doi.org/10.1016/j.ins.2015.12.011
|
|