
Security Software Development
Assessing and Managing Security Risks
- 321 pages
- English
- PDF
- Available on iOS & Android
About this book
Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed.
Drawing from the author's extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide:
Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approach
Explains the fundamental terms related to the security process
Elaborates on the pros and cons of each method, phase by phase, to help readers select the one that best suits their needs
Despite decades of extraordinary growth in software development, many open-source, government, regulatory, and industry organizations have been slow to adopt new application safety controls, hesitant to take on the added expense. This book improves understanding of the security environment and the need for safety measures. It shows readers how to analyze relevant threats to their applications and then implement time- and money-saving techniques to safeguard them.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front cover
- Contents
- Preface
- Acknowledgments
- Author Biography
- Chapter 1. Current Trends in Application Security
- Chapter 2. Security Risk Assessment Methodologies
- Chapter 3. Identifying Assets
- Chapter 4. Identifying Security Threats
- Chapter 5. Identifying Vulnerabilities
- Chapter 6. Analyzing Security Risks
- Chapter 7. Managing Security Risks
- Chapter 8. Risk Assessment and Risk Mitigation Activities in the SDLC
- Chapter 9. Maintaining a Security Risk Assessment and Risk Management Process
- Index
- Back cover