Loading

Secure Software Development a Survey
Sunil Patel1, Deepak Kulhare2, Arif Khan3

1Sunil Patel, M.Tech Scholar, Computer Science & Engineering, CIIT Indore, Indore, India.
2Deepak Kulhare, Associate Professor,Computer Science & Engineering, CIIT Indore, Indore, India.
3Arif Khan, Assistant Professor Computer Science & Engineering, CIIT Indore, Indore, India.
Manuscript received on March 11, 2013. | Revised Manuscript Received on March 12, 2013. | Manuscript published on March 25, 2013. | PP: 41-44 | Volume-1, Issue-6, April 2013. | Retrieval Number: F0245041613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Technology and its applications are raises day by day fashion, in our daily life we are various times interacted with different kinds of computer and its application that shows effects of technology in our daily life. To design and deploy an application that helps us on different utilities are made possible using the software engineering and its approaches. In this paper we provide the different aspects and issues on the traditional software development methodology, and discuss the proposed solution in the direction of optimize the approach to find better solutions with less effort and time. Additionally we focus mainly on the vulnerabilities in software engineering at the time of development and their solution. After all we propose a new way for scan and trace the vulnerabilities in software application development.
Keywords: Vulnerabilities, software development, security, processes.