TY - JOUR AU - M.Surakhi, Ola AU - Hudaib, Amjad AU - AlShraideh, Mohammad AU - Khanafseh, Mohammad PY - 2017/12/15 Y2 - 2024/03/29 TI - A Survey on Design Methods for Secure Software Development JF - INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY JA - IJCT VL - 16 IS - 7 SE - Research Articles DO - 10.24297/ijct.v16i7.6467 UR - https://rajpub.com/index.php/ijct/article/view/6467 SP - 7047-7064 AB - <p>Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many security-specific concepts that should be determined as requirements during software development life cycle in order to deliver a strong and secure software. This paper first, survey a number of existing processes, life cycle and methodologies needed for developing secure software based on the related published works. It starts by presenting the most relevant Secure Software Development Lifecycles, a comparison between the main security features for each process is proposed. The results of the comparison will give the software developer with a guideline which will help on selecting the best secure process. Second, the paper list a set of the most widely used specification languages with the advantages and disadvantages for each.</p> ER -