Back

A SWOT Analysis of Software Development Life Cycle Security Metrics.

  • Published In: Journal of Software: Evolution & Process, 2025, v. 37, n. 1. P. 1 1 of 3

  • Database: Academic Search Ultimate 2 of 3

  • Authored By: Khalid, Ayesha; Raza, Mushtaq; Afsar, Palwasha; Khan, Rafiq Ahmad; Mohmand, Muhammad Ismail; Rahman, Hanif Ur 3 of 3

Abstract

Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues. [ABSTRACT FROM AUTHOR]

Additional Information

  • Source:Journal of Software: Evolution & Process. 2025/01, Vol. 37, Issue 1, p1
  • Document Type:Literature Review
  • Subject Area:Computer Science
  • Publication Date:2025
  • ISSN:2047-7473
  • DOI:10.1002/smr.2744
  • Accession Number:183853560
  • Copyright Statement:Copyright of Journal of Software: Evolution & Process is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Looking to go deeper into this topic? Look for more articles on EBSCOhost.