Journal of Computer and Communications

Volume 2, Issue 14 (December 2014)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.34  Citations  

A Case Study of Adopting Security Guidelines in Undergraduate Software Engineering Education

HTML  XML Download Download as PDF (Size: 2547KB)  PP. 25-36  
DOI: 10.4236/jcc.2014.214003    3,759 Downloads   4,997 Views  Citations
Author(s)

ABSTRACT

Security plays a large role in software development; simply without its existence the software would be vulnerable to many different types of attacks. Software security prevents leaks of data, alternation of data, and unauthorized access to data. Building a secure software involves a number of different processes but security awareness and implementation are the most important ones among them. To produce high quality software security engineers need to meet today’s cybersecurity demands, security awareness and implementation must be integrated in undergraduate computer science programming courses. In this paper, we demonstrate the importance of adopting security guidelines in undergraduate software engineering education. Thus, this paper focuses on integrating secure guidelines into existing applications to eliminate common security vulnerabilities. An assessment table, derived from several existing Java security guidelines, is developed to provide in depth critiques of the selected capstone project. Potential security vulnerabilities in the capstone project are identified and presented in a form showing the degree of threats against the three security characteristics: confidentiality, integrity, and availability addressed in the McCumber Cube model. Meanwhile, vulnerability density of the capstone project is calculated to demonstrate the performance of this research.

Share and Cite:

Hu, Y. and Scott, C. (2014) A Case Study of Adopting Security Guidelines in Undergraduate Software Engineering Education. Journal of Computer and Communications, 2, 25-36. doi: 10.4236/jcc.2014.214003.

Cited by

[1] Effective Cyber Security Strategies for Small Businesses
Walden Dissertations and Doctoral Studies, 2017

Copyright © 2021 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.