This research will begin by mapping the stages of software development and secure software development so that the comparison of the needs of both parties can be seen, where the application of security concepts will refer to the Software Security Touchpoint, and for the risk side a comparison of risk assessment methods that must support a development secure software, seen from the stages and output that will be generated in the form of security controls. So that a guideline can be produced in making IT security control as a solution in developing secure software based on risk during Software Development Life Cycle.
CITATION STYLE
Rijayanti, R., Hendayun, M., Suharto, T., & Hwang, M. (2020). A Study on IT Security Control by Comparison of Secure Software Development Process. In Lecture Notes in Electrical Engineering (Vol. 621, pp. 551–560). Springer. https://doi.org/10.1007/978-981-15-1465-4_54
Mendeley helps you to discover research relevant for your work.