SECURE SOFTWARE DEVELOPING RECOMMENDATIONS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2019.6.8293

Keywords:

secure software development; software development life cycle, vulnerabilities, buffer overflow, static and dynamic analysis, bufer overflow prevention mechanims

Abstract

Adverse effects on information in the functioning computer systems of various purpose is carried out in order to violate their confidentiality, integrity and accessibility. These threats arise from software vulnerabilities and result in unauthorized access to data or leakage of sensitive information To solve this problem, firstly, an analysis of the software life cycle was carried out in order to determine the stages of software development. Secondly, taking into account the stages obtained, possible threats to information were identified. A buffer overflow vulnerability was considered as a basic example of a threat. Possible ways of exploiting this vulnerability are given, the pros and cons of detection and counteraction tools are analyzed. As a result, recommendations on the development of safe software are presented, both in general terms and more specific in order to avoid the buffer overflow vulnerability. Having using such recommendations, enterprises could reduce the risk of sensitive information breach and minimize outlane. The results obtained in the paper can also be used to make decisions about the possibility of operating the relevant software.

Downloads

Download data is not yet available.

Downloads


Abstract views: 869

Published

2019-12-26

How to Cite

Grechko, V., Babenko, T., & Myrutenko, L. (2019). SECURE SOFTWARE DEVELOPING RECOMMENDATIONS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(6), 82–93. https://doi.org/10.28925/2663-4023.2019.6.8293