Location of Repository

Web development evolution: the business perspective on security

By W.B. Glisson, L.M. Glisson and R. Welland

Abstract

Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and defend accountability. Research indicates that a significant portion of the financial losses is due to straight forward software design errors. Security should be addressed throughout the application development process via an independent methodology containing customizable components. The methodology is designed to integrate with an organization’s existing software development processes while providing structure to implement secure applications, helping companies mitigate hard and soft costs

Topics: QA75
Year: 2006
OAI identifier: oai:eprints.gla.ac.uk:49149
Provided by: Enlighten

Suggested articles

Preview

Citations

  1. (1996). 104-191 104th Congress, Health Insurance Portabili ty and Accountability Act of
  2. (1996). 104-191 104th Congress, Health Insurance Portability and Accountability Act of
  3. A Good Defense Information Securi ty as a Cost of Doing Business .
  4. A Good Defense Information Security as a Cost of Doing Business.
  5. Application Secu rity Project, The Ten Most Crit ical Web Application Security Vulnerabilities.
  6. Application Security Project, The Ten Most Critical Web Application Security Vulnerabilities.
  7. Currency Converter.
  8. Engineering. doi
  9. Facts and doi
  10. (2004). Global Security Survey. c2004: London.
  11. (2005). Guide, Financial Mode rnization Act (Gramm-L each-Bliley Act).
  12. (2005). Guide, Financial Modernization Act (Gramm-Leach-Bliley Act). doi
  13. INFORMATION SECURITY Effective Patch Management is Critical to Mitigating Software Vulnerabilities,
  14. (2005). Information Security News: Microsoft announces corporate strategy shift toward security and privacy.
  15. (2004). ISS Service Helps User s Comply With Fed Laws.
  16. (2004). ISS Service Helps Users Comply With Fed Laws.
  17. Official (ISC)2 Guide to the CISSP Exam. c2004, Boca Raton: Auerbach Publications. [22] Hare, C., Policy Development, doi
  18. Organization for In ternet Safety, Guidelines for Security Vulnerability Reporting and Response.
  19. Organization for Internet Safety, Guidelines for Security Vulnerability Reporting and Response.
  20. S anctum Buy Shows Security Is Key to Application Development
  21. Sanctum Buy Shows Security Is Key to Application Development.
  22. Secret Service head calls for cybersecurity cooperation.
  23. (2005). Security Attacks On IT Systems More Than Double, According to Respondents
  24. (2005). Security Attacks On IT Systems More Than Double, According to Respondents of Deloitte
  25. Security: More Than Good Programming.
  26. (2005). Senators propose sweeping data-security bill.
  27. Software Security at the Summit. doi
  28. Strategies for e-Business. c2005,
  29. The art of deception : controlling the human element of security / doi
  30. The Bugs Stop Here,
  31. The Death of "e" and the Birth of the Real New Economy: Business Models,
  32. The econsultant : guiding clients to Net success. c2001.,
  33. (2004). The Information Security Breaches Survey doi
  34. The internet security guidebook : from planning to deployment ,
  35. The internet security guidebook: from planning to deployment,
  36. (2005). The Sarbanes -Oxley Act of 2002: An Overview, Analysis, and Caveats.
  37. (2005). The Sarbanes-Oxley Act of 2002: An Overview, Analysis, and Caveats.
  38. The Security Policy life Cycle: Functions and Responsibilities, doi
  39. The Wealth of Knowledge. doi
  40. (2005). Top Web a pplication security problems identified SearchSecurity.com.
  41. (2005). Top Web application security problems identified SearchSecurity.com.
  42. Towards Enforcing Security Policy: En couraging Personal Accountability for Corporate Information Security Policy , doi
  43. Towards Enforcing Security Policy: Encouraging Personal Accountability for Corporate Information Security Policy, doi
  44. Weapons for the Hunt: Methods for Software Risk Assessment.
  45. (2004). Web applications have become IT 's next security battleground. San Antonio Business Journal,
  46. (2004). Web applications have become IT's next security battleground. San Antonio Business Journal,
  47. Web Development Evolution: The Assimilation of Web Engineering Security. doi
  48. Web Engineering Curriculum: A Case Study of an Evolving Framework . doi
  49. Web Engineering Curriculum: A Case Study of an Evolving Framework. doi
  50. Why Application Security is the New Business Imperative - and How to Achieve It.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.