This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:Investigating software security practices-2014-12-17-OWASP-BE.pdf

From OWASP
Jump to: navigation, search
Investigating_software_security_practices-2014-12-17-OWASP-BE.pdf(file size: 572 KB, MIME type: application/pdf)

Investigating software security practices (by Koen Yskout and Laurens Sion, iMinds-DistriNet)

Security must be considered throughout the whole software development cycle, including early phases such as requirements elicitation and software design. While this is a widely accepted statement, it is not evident to achieve this in practice. Although some academic proposals along this line exist, they are not used in industry. As academics, before making any new proposals, we want to perform a survey in order to understand to what degree security and privacy are currently present in the requirements elicitation and architecture and design activities of organizations, how they are incorporated in practice, and what the benefits and limitations of the existing approaches are. In this short talk, we will explore why such a study is needed, what our goal is, and why you should participate.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current09:42, 31 January 2015 (572 KB)LievenDesmet (talk | contribs)Investigating software security practices (by Koen Yskout and Laurens Sion, iMinds-DistriNet) Security must be considered throughout the whole software development cycle, including early phases such as requirements elicitation and software design. Whi...
  • You cannot overwrite this file.

There are no pages that link to this file.