New hybrid methodology for secure systems

مقدم أطروحة جامعية

Zakariyya, Muhammad Zuhayr

مشرف أطروحة جامعية

al-Shaykh, Asim Abd al-Rahman
Qusayf, Abd Allah

أعضاء اللجنة

al-Qasaymah, Malik
al-Qatawnah, Jafar

الجامعة

جامعة الأميرة سمية للتكنولوجيا

الكلية

كلية الملك الحسين لعلوم الحوسبة

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2015

الملخص الإنجليزي

Software security is considered as a time consuming and after-thought activity, this could be because of its complexity or the lack of enough knowledge.

Today`s software development companies are focusing on high-speed software delivery, however, many companies are still using the traditional methodologies.

In this work, traditional Waterfall and Agile approaches characteristics have been described.

Also, some of the most well-known security engineering processes have been identified to have a deep analysis about the available security activities.

This study proposes a new secure methodology, which aims to give security its needed attention by the development team, the proposed methodology mixed Waterfall and Scrum to produce a hybrid software development approach that will apply the rules of both of them.

The methodology will integrate security activities according to well-known security processes and best-practices.

A survey has been conducted with IT professionals to explore and analyze the current situation of the software development companies, detailed interviews were conducted with professionals and their feedback will be used as an evaluation for this study.

The achieved results show that security is not considered during software development, and the new proposed hybrid methodology could be a good start to build secure software’s.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

عدد الصفحات

84

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background and related work.

Chapter Three : The proposed framework.

Chapter Four : Discussion and evaluation.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Zakariyya, Muhammad Zuhayr. (2015). New hybrid methodology for secure systems. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-693702

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Zakariyya, Muhammad Zuhayr. New hybrid methodology for secure systems. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2015).
https://search.emarefa.net/detail/BIM-693702

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Zakariyya, Muhammad Zuhayr. (2015). New hybrid methodology for secure systems. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-693702

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-693702