13Cyber Security Challenges Model: SLR-Based Protocol and Initial Findings

SHAH ZAIB1, ABDUL WAHID KHAN1, IQBAL QASIM1

1 Department of Computer Science, University of Science and Technology, Bannu, Pakistan

Email: shahzebbiseb@gmail.com, shahzebbiseb@gmail.com, Iqktk@hotmail.com

Abstract

As cybercrime is increasing day by day and taking a wild shape in society, even highly reputable and government organizations’ software are not safe from those attacks. So, the findings of this study will contribute to finding the reasons for how cyber attacks take place and how harmful they can be. A systematic literature review (SLR) is used to discover the negative effects of cyber attacks on vendor organizations in context of software development and also to tell us how to deal with the negative consequences of these attacks. We have identified 13 critical challenges through the SLR. Because of these findings we will get to know about the real-world practices which can be used to solve and overcome the negative consequences of cyber attacks. This chapter will provide a roadmap to conduct the research. The development of a cyber security challenges model (CSCM) is the conclusive aim of this protocol.

Keywords: Vendor, software development, cyber security, challenges, practices, systematic literature review

13.1 Introduction

The secure development of software is essential and basic in regard to the “confidentiality,” “integrity,” and “availability” of all product applications [1]. In ...

Get Evolving Software Processes now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.