A Study on IT Security Control by Comparison of Secure Software Development Process

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research will begin by mapping the stages of software development and secure software development so that the comparison of the needs of both parties can be seen, where the application of security concepts will refer to the Software Security Touchpoint, and for the risk side a comparison of risk assessment methods that must support a development secure software, seen from the stages and output that will be generated in the form of security controls. So that a guideline can be produced in making IT security control as a solution in developing secure software based on risk during Software Development Life Cycle.

Cite

CITATION STYLE

APA

Rijayanti, R., Hendayun, M., Suharto, T., & Hwang, M. (2020). A Study on IT Security Control by Comparison of Secure Software Development Process. In Lecture Notes in Electrical Engineering (Vol. 621, pp. 551–560). Springer. https://doi.org/10.1007/978-981-15-1465-4_54

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free