CLEI Electronic Journal (Dec 2016)

Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

  • Paulina Silva,
  • René Noël,
  • Santiago Matalonga,
  • Hernán Astudillo,
  • Diego Gatica,
  • Gastón Marquez

DOI
https://doi.org/10.19153/cleiej.19.3.5
Journal volume & issue
Vol. 19, no. 3

Abstract

Read online

Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM) have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC); while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.

Keywords