Preview

Why is Software Quality Important for Security?

Powerful Essays
Open Document
Open Document
897 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Why is Software Quality Important for Security?
ESSAY
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
Software errors pose a constant threat to information systems, causing untold losses in productivity. Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities. A major problem with software is the presence of hidden bugs or program code defects. Studies have shown that it is virtually impossible to eliminate all bugs from large programs. Flaws in commercial software not only impede performance but also create security vulnerabilities that open networks to intruders.
To correct software flaws once they are identified, the software vendor creates small pieces of software called patches to repair the flaws without affecting the proper operation of the software. Organizations must maintain best efforts to both make sure purchased software is up to date and make sure their own software and programming is as bug-free as possible by employing software metrics and rigorous software testing. Ongoing use of metrics allows the information systems department and end users to jointly measure the performance of the system and identify problems as they occur.
Examples of software metrics include the number of transactions that can be processed in a specified unit of time, online response time, the number of payroll checks printed per hour, and the number of known bugs per hundred lines of program code. For metrics to be successful, they must be carefully designed, formal, objective, and used consistently. Early, regular, and thorough testing will contribute significantly to system quality. the software should be tested carefully before it publish to the market by a small group of people carefully selected based on the skills needed for the particular objectives being tested.
Once developers start writing software programs, coding

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pt2520 Unit 3 Metrics

    • 544 Words
    • 3 Pages

    In this presentation, the author has explained different metrics and there attributed used to measure software. A person can only measure and represent it in number when he knows something about it. On the other hand, if has no idea about it then he doesn’t have any idea about it [1]. There are two types of software complexity metrics. One gives the efficiency of the machine while running the software which is called as computational complexity. Another one is giving us the factors which affect the software developer capacity to develop good software which is known as psychological complexity. There are two types of software metrics. The process metrics which gives details of the process used such as software life cycle used for development, the time consumed for the development etc. The…

    • 544 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fast bug and security fixes: Open source software usually has many people combing its source code, who rapidly fix problems as they are discovered.(3)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    cmis 102 homework 3

    • 452 Words
    • 2 Pages

    A training program being in place to prevent employees not knowing how to use, how to prepare against a software failure and prevent customers from being mad if they have to use the software.…

    • 452 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    1. Briefly state the main idea of this chapter. Since software in one form or another controls every computer or computer component, it becomes a more important and fundamental part of our life. Even though we may not understand the languages that make up the software, we must be aware of the elements of software that affect its use. Verification and Validation, reliability, security, safety, and quality are some of the major points examined and brought to light. It delves into the various reasons of why software fails and who is responsible. More importantly, it covers what consumer protection exists and the rights of software buyer's.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3

    • 680 Words
    • 3 Pages

    Although many organizations have reduce significant number of design and coding defects through software development lifecycle; there still remains security holes that arise when an application is deployed and interacts with other processes and different operating systems (Cobb, 2014). Another reason that penetration test is critical is many Payment Card Industry Data Security Standard (PCI DSS) mandate internal and external penetration test (Cobb,2014).…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    TEST 1

    • 781 Words
    • 4 Pages

    What name is given to a software review that identifies bugs or errors in software?…

    • 781 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Unit 6 Assignment 2 Choosing the right programming language. (P2) There are several factors to consider when choosing the right programming language, these include Organisational policy, suitability in terms of available features and tools, availability of trained staff and development and maintenance costs. Organisational policy Organisations which make and develop loads of computer software’s and programs tend to have a policy of using a certain language, a reason for this might be because that language allows them to make all their software consistent and easier to maintain.…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    All projects are not the equal so it is essential to define the cost, goals and schedule that is necessary for the project at hand (Johnson, 2012). The system analyst is the connector between the client and the technical team of software developers and programmers (Guille, 2007). Analyst understands the client 's needs from the proposed system but also is able to resolve technical queries and issues that the team may face while developing project (Guille, 2007). The responsibility of the software developer is to develop a software related development for the client by been involved in the dynamic innovation in sections that involve development and system integration (Guille, 2007). After the developer has developed the software/application the system tester, extensive testing is done to show the outcome of the application (Johnson, 2012). Any flaws or discrepancies will be corrected to ensure that the stakeholder/business requirements are been fulfilled (Johnson, 2012). Once adequate testing has been performed the new system will be up and running to the expectations of the stakeholders/business system maintenance will be needed to ensure that the software/application continues to run properly (Guille,…

    • 744 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An effective mechanism for high quality feedback: The metric should provide you the information that can lead to a higher quality end product.…

    • 431 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Final Study Guide

    • 1271 Words
    • 7 Pages

    Patch: software developers group fixes for high-priority failures into a patch that can be applied to all copies of a product…

    • 1271 Words
    • 7 Pages
    Good Essays