A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Mitigation of Threats using Secure SDLC
2015
IJARCCE
Security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Secure SDLC . In this paper, we describe how to apply the secure SDLC. Software design phase in such a way that additional
doi:10.17148/ijarcce.2015.44117
fatcat:jkjucfz5tfbgrptxyunuwvpvjm