Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  Published Paper Details:

  Paper Title

Secure Software Development Practices for Mitigating Cyber Vulnerabilities in Enterprise Applications

  Authors

  Oladipupo Dopamu,  Innocent Asevameh,  Philip Nwamina,  Joseph Adesiyan,  Patrick Evah

  Keywords

Vulnerabilities, Threat Modelling, Secure Coding, DevSecOps, Continuous Integration, Secure Development Lifecycle, Application Security Testing, Penetration Testing, Privacy-Cantered Design, Accountability, Security Awareness, Risk Mitigation, Vulnerability Detection, Machine Learning, Cultural Transformation.

  Abstract


In today's digital world, enterprises are heavily reliant on software applications to run their critical operations. However, vulnerabilities in these applications pose serious security risks by enabling cyberattacks that can compromise sensitive data and disrupt businesses. As software drives much of modern commerce and communications, it has become a prime target for malicious exploitation. To address this pressing issue, software development practices must adopt a security-first approach throughout the entire software development life cycle from design to deployment. This research paper investigates the prevalent cyber vulnerabilities in enterprise applications and evaluates various secure software development methodologies for mitigating security risks. Through an analysis of past cyber incidents and their underlying technical causes, the research identifies the most common types of vulnerabilities such as injection flaws, authentication and authorization flaws, and code quality issues. It then examines different security assurance approaches like threat modelling, secure coding standards, vulnerability scanning, and penetration testing that can help developers build robust defences against attacks. The research findings highlight the importance of adopting a planned, preventative strategy through integrated security practices instead of relying solely on reactive patching.

  IJCRT's Publication Details

  Unique Identification Number - IJCRT2406441

  Paper ID - 263831

  Page Number(s) - e20-e45

  Pubished in - Volume 12 | Issue 6 | June 2024

  DOI (Digital Object Identifier) -   

  Publisher Name - IJCRT | www.ijcrt.org | ISSN : 2320-2882

  E-ISSN Number - 2320-2882

  Cite this article

  Oladipupo Dopamu,  Innocent Asevameh,  Philip Nwamina,  Joseph Adesiyan,  Patrick Evah,   "Secure Software Development Practices for Mitigating Cyber Vulnerabilities in Enterprise Applications", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.12, Issue 6, pp.e20-e45, June 2024, Available at :http://www.ijcrt.org/papers/IJCRT2406441.pdf

  Share this article

  Article Preview

  Indexing Partners

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
Call For Paper June 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer