Analysis of Software Development and Operation Measures from the Perspective of Security Technology
Download PDF
$currentUrl="http://$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]"

Keywords

Security technology
Software development
Operation and maintenance

DOI

10.26689/jera.v8i6.9024

Submitted : 2024-11-03
Accepted : 2024-11-18
Published : 2024-12-03

Abstract

Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data.

References

Werder K, Li Y, Maedche A, et al., 2021, Software Development Process Ambidexterity and Project Performance: A Coordination Cost-Effectiveness View. IEEE Transactions on Software Engineering, 47(4): 836–849.

Liyan S, Leandro L, Minku A, 2023, Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development. IEEE Transactions on Software Engineering, 49(2): 646–666.

Elvan K, Eric G, Arie VD, et al., 2022, Factors Affecting On-Time Delivery in Large-Scale Agile Software Development. IEEE Transactions on Software Engineering, 48(9): 3573–3592.

Bernsmed K, Cruzes DS, Jaatun MG, et al., 2022, Adopting Threat Modeling in Agile Software Development Projects. The Journal of Systems and Software, 2022: 183.

Patent Issued for Software Development Environment with Compilation and Read-Evaluate-Print-Loop Operations (USPTO 11256481), 2022: 5338–5342.

Khan SU, Khan AW, Khan F, et al., 2022, Critical Success Factors of Component-Based Software Outsourcing Development From Vendors’ Perspective: A Systematic Literature Review. IEEE Access, 10: 1650–1658.