Critical Evaluation of The Strategies Involved in Analyzing Security of Software Architecture-Research Sample

QUESTION

 

Research Proposal

Choose any topic in the area of Software Design and Architecture submit a short proposal.

Proposal requirements

    1. The proposal should clearly show what you are planning to do (about a page –double spaced would do it.).
    2. You are encouraged to emphasize depth over breadth, so do not attempt coverage of too many diverse areas.
    3. Use effective organization, correct English grammar and punctuation, acknowledge references where appropriate, and use a style and level appropriate for a technical reader.

Final report

    1. Prepare a complete final report of your research and submit.

Minimum requirements

1 page – title, your name, course, date, abstract

1 page – table of contents

8 – 15 pages – text of report, introduction, body in sections, summary; typed,

double-spaced

1 page – bibliography/references

IEEE/ACM recommended style/format

 

ANSWER

 

CRITICAL EVALUATION OF THE STRATEGIES INVOLVED IN ANALYZING SECURITY OF SOFTWARE ARCHITECTURE

NAME:

COURSE:

DATE:

Abstract

The current study highlights strategies involved in case of securing software architecture. Along with that, it discusses the way of maintaining an effective security technique for protecting database and avoiding cyber theft. Dues to consisting of small size of different machines, different abstract diagrams and security strategy have been followed to maintain an effective design process and understand the machine language. Software architecture indicates to the process of designing software components and making strategy related to interfaces of establishing framework for the purpose of enhancing operation process of machine system. Quality of software based on accurate design and run-time quality ensures software architects regarding safety of software architecture. Researcher has followed secondary qualitative data analysis for the purpose of analyzing deeply importance of safety in software industry and requirements of developing system software. Secondary qualitative data has been gathered from authentic journals and company websites. In case of taking strategy related to implication of threat modeling and making advance quality designing, most significant challenge is budget crisis.

Keywords: Software Architecture, real time processing, Software security analysis, strong personnel, budget crisis, designing and coding

  1. Introduction

The current report sheds light on strategies involved in case of securing software architecture. Along with that, it discusses the way of maintaining an effective security technique for protecting database and avoiding cyber theft. Strategies such as strong cloud computing as well as database and programming language are used for the purpose of maintaining security of software architecture.

A. Background of software architecture

Software architecture has been renowned since the inauguration of software engineering in 1975. Due to consisting of small size of different machines, different abstract diagrams and security strategy have been followed to maintain an effective design process and understand the machine language. In case of military projects of UK, different levels of language description and security strategy have been used through military code of standard such as JSP 188. Architects have modified military projects and software instruments by sketching ideas and pointing out accurate diagrams on the wall of control unit. Along with that, programmatic language has been developed by architects in past few years to avoid issues related to malicious and spamming of messages.

Security devices such as anti-virus gaming software as well as different firewalls and important settings in the operating system are most common security issues. Along with that, issues including spamming of messages through e-mail as well as hacking and malicious software have affected negatively operation process of UK software industry.

Side channel attacks and virtualization have been major issues in cloud computing due to which overall software architecture has been devastated currently.

II. Literature review

  1. Critically describing concept of software architecture

Software architecture indicates to the process of designing software components and making strategy related to interfaces of establishing framework for the purpose of enhancing operation process of machine system. Software architecture is set of steps such as policies and guidelines and models as well as appropriate relationship between these architects which support selection and implementation of software solutions by aligning business goals [1].

B. Critically describing safety issue in software architecture

Systematic failures in different systems can be raised at any stage of implementation and development process. Generally software architecture is divided into three different steps such as technical investigation as well as invention and checking. At the initial phase, building interface of user prototypes and working on appropriate requirements are involved due to which issues related to spamming of messages are raised. In the second stage, issues such as technical issues of blueprint can be raised. Structural and technology related issues major common issues in case of architecting software and final testing for the purpose of avoiding cyber theft.

Heavy documentation process and structural issues such as gathering of invalid data related to problem in software are key issues in software architecture. Structural issues such as developing software are raised in case of having lack of information related to required changes in software [2]. Without gathering appropriate information regarding appropriate changes in designing and programming language, architects cannot be gone to the next step such as implementation [3].

C. Critically describing factors influencing safety of software architecture

Software architecture is generally the process of designing and creating strategy based on implementation of software. Due to which, different factors such as understanding requirements of clients and system issue as well as communicating with architects and ensuring accurate operation process influence software architecture.

  1. Structure and goal of software development organization: with the use of strategic information related to goal of software development organization, software architecture is able to develop accurate software by including appropriate programming language (Refer to appendix 1).

  2. Design qualities and run time qualities: quality of software based on accurate design and run-time quality ensures software architects regarding safety of software architecture. Along with that, runtime quality ensures effective operation process into hardware which is the key reason of maintaining security of software architecture. Effective design quality based on system software and runtime capacity is significant ways of avoiding threats related to spamming of messages and malicious [4]. With the adoption of taking strategy related to advance quality design process, significant changes into programming language is essential for converting into machine language and enhancing operation of system [5].

D. Critically determining different strategy based on security of software architecture

Architecture tradeoff analysis process:

The following process includes three significant steps such as performance of machine as well as requirements and unidentified needs of system.

Performance: it ensures prototyping of user-interface and performance mechanisms such as scanning system and strong programming language based on which significant changes can be processed into installed software. Secure ID system and internal control ensures effective performance and maintenance of safety of software architecture (Refer to appendix 2).

Requirements: the following themes enables architects proper requirements on the basis of designing such as systematic performance and runtime facility as well as error detection. Based on which, architects can be able to develop appropriate software [1].

Knowledge of Threat Modeling: with the use of threat modeling, software architects are able to detect the level of impact on system software by hacker. Based on which, they are able to take appropriate strategy related to changes in programming language and improvement in runtime and code detection process. Along with that, different benefits are associated with adopting the strategy of threat modeling. Detecting instantly issues related to malicious attack in SDLC before writing single code as well as maximizing testing budget by reviewing code of error are key benefits of the following model [6].

Ensuring proper safety design as well as developing software within budget of software organizations is significant ways of maintaining security of software architecture.

Security Control Design analysis:

Dynamic application as well as static application is checked through security control for ensuring operation performance and background error. Security control is the significant way of ensuring quality of designing process and whole framework of software architecture [7]. Without taking strategy related to measurement of dynamic application and static application in the background of installed software, accurate security strategy cannot be adopted significantly [4].

Figure 1: Software security strategies based on software architecture

(Source: [8])

Verification and generating deployment plan: executing test plan in front of members of software organizations and maintaining deployment plan are significant ways of keeping safety [5].

E. Critically defining impact of safety on software architecture

With the aid of trade off analysis process, safety related to appropriate runtime and detection of background error can be maintained into system software. Quickly scanning code of static application running in background is the process of finding out vulnerabilities [9]. Eliminating vulnerabilities and avoiding malicious software basically irrelevant programming language are significant ways of maintaining safety of operation process of system software [10].

F. Critically describing challenges involved in taking strategy

Crisis of budget: in case of taking strategy related to implication of threat modeling and making advance quality designing, most significant challenge is crisis of budget. If capability of software development organization is limited then software architects fail to develop accurate software [11]. However, in case of installing accurate software which is required for avoiding issues related to ineffective runtime strategy regarding development of accurate software cannot be taken for having limited budget.

Trade Offs: real time processing software is needed in case of installing into hardware. In case of developing software and maintaining security of software architecture, consideration of existing technologies is essential. Without considering real time processing software and taking strategy regarding use of existing technologies, appropriate system software within the capability of organization cannot be developed [12].

Strong personnel: in case of having knowledge regarding existing technology and capability of specific organization, software architects can be able to develop appropriate software within budget of organization [13]. Moreover, strong personnel are needed for the purpose of developing accurate system software with the aid of team performance and exact budget allocation.

G. Gap in literature

In the following study, different factors influencing strategy of software architecture and the way of impacting on security of system software have been discussed in a meaningful way. However, different measurement technique of checking overall performance of system software has not been discussed briefly. Based on which, information related to internal operation and reading code of system software can be gathered. Therefore, certain gap between these two factors has been created in the following study.

H. Summary

The chapter discusses importance of software architecture as well as strategies involved for developing accurate system software. Along with that, it demonstrates significant factors which influence mostly on software architecture and the way of affecting security of software architecture.

III. Methodology

  1. Data Collection method

Data based on software architecture and different factors influencing strategy of developing software have been gathered from secondary sources such as journals as well as newspaper articles and websites. Researcher has followed secondary qualitative data analysis for the purpose of analyzing deeply importance of safety in software industry and requirements of developing system software [15]. Along with that, secondary qualitative data analysis is cost efficient as well as time saving due to having existing information on different journals and websites. Qualitative data analysis assists in gathering knowledge regarding importance of security and safety related issues at the time of taking strategy on software infrastructure.

  1. Data Collection tool

Data has been gathered with the aid of MS Excel and MS word as well as SPSS which ensure appropriate listing of all data related to strategies involved in maintaining safety of software architecture.

  1. Reliability and validity of data

Secondary qualitative data has been gathered from authentic journals and company websites. Along with that, data related to strategy and safety issues in software architecture has been collected from Proquest database due to being authentic and having relevant information regarding the topic.

  1. Ethical Consideration

Researcher has maintained confidentiality on gathered data based on software architecture as per guidelines of Data Protection Act 1998. Along with that, following act demonstrates that essential data will be followed to complete the research and excess data will not be considered [14]. Moreover, monetary transaction has not been used in conducting the research and act of plagiarism has been followed to complete the research successfully.

  1. Research Limitations

Due to having limited time, significant information related to software infrastructure and system protection has not been included in the following study. Along with that, limited number of journals and newspaper articles based on strategies involved in maintaining security of software architecture is another key reasons of including limited information.

IV. Findings and analysis

  1. Secondary thematic analysis

Theme 1: Advance quality design and strong personnel having knowledge regarding security control design are enough to maintain safety

Dynamic application as well as static application is checked through security control for ensuring operation performance and background error. Security control is the significant way of ensuring quality of designing process and whole framework of software architecture. Advance quality design is the key approach taken by software architects for the purpose of ensuring real time processing and runtime facility [8]. With the aid of trade off analysis process, safety related to appropriate runtime and detection of background error can be maintained into system software. Quickly scanning code of static application running in background is the process of finding out vulnerabilities [15]. Thus, from the following point of view, it is clear that quality design is the systematic way of maintaining safety of software architecture.

Quality of software based on accurate design and run-time quality ensures software architects regarding safety of software architecture. Along with that, runtime quality ensures effective operation process into hardware which is the key reason of maintaining security of software architecture [16]. Without taking strategy related to measurement of dynamic application and static application in the background of installed software, accurate security strategy cannot be adopted significantly [18].

Theme 2: Crisis of budget and strong personnel is significant challenges in case of maintaining security of software architecture

In case of taking strategy related to implication of threat modeling and making advance quality designing, most significant challenge is crisis of budget. If capability of software development organization is limited then software architects fail to develop accurate software. Budget is most significant consideration for ensuring greatest security of software architecture [17]. On the other hand, strong personnel having vast knowledge regarding threat modeling and security analysis is most common challenge for maintaining security. In case of having limited knowledge regarding designing and security analysis, software cannot be developed for the purpose of maintaining safety [19].

Discussion

It is clear that appropriate budget is needed for maintaining safety of software architecture with the aid of advance quality designing software. With the aid of trade off analysis process, safety related to appropriate runtime and detection of background error can be maintained into system software. Strong personnel having vast knowledge regarding internal software operation and threat modeling have been key advantages of maintaining real time processing software. Architecture trade off analysis process ensures prototyping of user interface which is significant way of maintaining safety and developing real time processing software.

V. Conclusion

A. Conclusion

Thus, it can be concluded that quality of software based on accurate design and run-time quality ensures software architects regarding safety of software architecture. Along with that, runtime quality ensures effective operation process into hardware which is the key reason of maintaining security of software architecture. Software architecture is generally the process of designing and creating strategy based on implementation of software. Security devices such as anti-virus gaming software as well as different firewalls and important settings in the operating system are most common security issues. With the use of threat modeling, software architects are able to detect the level of impact on system software by hacker. Heavy documentation process and structural issues such as gathering of invalid data related to problem in software are key issues in software architecture. Structural issues such as developing software are raised in case of having lack of information related to required changes in software.

  1. Limitations

Due to having limited time, significant information related to arising issues related to software infrastructure and system protection has not been included in the following study.

  1. Future Scope

Factors influencing strategies involved in maintaining security of software architecture and impact on security of strong system software have been discussed in the following study. However, future research might be conducted on the basis of significance of system protection and impact on overall performance.

Reference List

[1] A. Metzger, and K. Pohl, Software product line engineering and variability management: achievements and challenges. In Proceedings of the on Future of Software Engineering . Vol. 3, pp. 70-84, May, 2014. s

[2] A. Serebrenik, and T. Mens, Challenges in software ecosystems research. In Proceedings of the 2015 European Conference on Software Architecture Workshops, Vol. 2, pp. 40, Sep, 2015.

[3] Ahmad, S. Namal, M. Ylianttila, and A. Gurtov. Security in software defined networks: A survey. IEEE Communications Surveys & TutorialsVol. 17, pp.2317-2346, Jan. 2015.

[4] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, Network function virtualization: Challenges and opportunities for innovations. IEEE Communications MagazineVol. 53, pp.90-97, June, 2017.

[5] C. Esposito, A. Castiglione, and K.K.R Choo, Challenges in delivering software in the cloud as microservices. IEEE Cloud ComputingVol. 13, pp.10-14, May, 2014.

[6] C. Thompson, J. White, and D.C. Schmidt, Analyzing mobile application software power consumption via model-driven engineering. In Advances and Applications in Model-Driven Engineering , Vol. 10. pp. 342-367, Aug. 2014.

[7] C.C.Venters, R. Capilla, S. Betz , B. Penzenstadler, T.Crick , S. Crouch , E.Y. Nakagawa, C. Becker, and C. Carrillo, Software sustainability: Research and practice from a software architecture viewpoint. Journal of Systems and Software, Vol. 138, pp.174-188. Aug. 2018.

[8]citeseerx.ist.psu.edu. (2019). Software Architecture. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.66.7240&rep=rep1&type=pdf [Accessed on: 03/02/19]

[9] D. Garlan, Software architecture: a travelogue. In Proceedings of the on Future of Software Engineering, Vol. 10. pp. 29-39, May, 2014.

[10] E. MacLennan, and J.P. Van Belle, Factors affecting the organizational adoption of service-oriented architecture (SOA). Information Systems and e-Business ManagementVol. 12, pp.71-100, Dec. 2014.

[11] E.B. Fernandez, R. Monge, and K. Hashizume, Building a security reference architecture for cloud systems. Requirements EngineeringVol. 21, pp.225-249, Jan. 2016.

[11] J. Wan, D. Zhang, S. Zhao, L. Yang, and J. Lloret, Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions. IEEE Communications MagazineVol. 52, pp.106-113, Aug, 2014.

[12] J.H. Hoepman, Privacy design strategies. In IFIP International Information Security Conference. Vol. 10. pp. 446-459, June 2014.

[13] K. Ebner, T. Buhnen, and N. Urbach, Think big with Big Data: Identifying suitable Big Data strategies in corporate environments. In System Sciences (HICSS), 2014 47th Hawaii International Conference on . Vol. 10. pp. 3748-3757, Jan. 2014.

[14] legislation.gov.uk. (2019). Data Protection Act 1998. Available at: https://www.legislation.gov.uk/ukpga/1998/29/contents [Accessed on: 03/02/19]

[15] M. Tahir, F. Khan, M. Babar, F. Arif, and F. Khan, Framework for Better Reusability in Component Based Software Engineering. the Journal of Applied Environmental and Biological Sciences (JAEBS), Vol. 6, pp.77-81. July, 2016.

[16] R. Capilla , A. Jansen, A.Tang , P. Avgeriou, and M.A. Babar, 10 years of software architecture knowledge management: Practice and future. Journal of Systems and Software, Vol. 116, pp.191-205, Aug. 2016.

[17] S. Scott-Hayward, S. Natarajan and S.Sezer , A survey of security in software defined networks. IEEE Communications Surveys & TutorialsVol. 18, pp.623-654. Aug. 2016.

[18] waset.org. (2019). Strategies involved in maintaining security of software architecture. Available at: https://waset.org/publications/5016/core-issues-affecting-software-architecture-in-enterprise-projects [Accessed on: 03/02/19]

[19] Y. Ku, M. Lu, R.L. Gerla, F. Gomes, Ongaro, and E. Cerqueira, Towards software-defined VANET: Architecture and services. In 2014 13th annual Mediterranean ad hoc networking workshop , Vol. 10, pp. 103-110, June, 2014

Appendices

Appendix 1: Designing and testing of model for maintaining safety

(Source: https://www.researchgate.net/figure/SCE-software-architecture_fig1_220205656)

Appendix 2: Secure ID system and internal control for maintaining safety of software architecture

(Source: http://ricksnursery.com/software-architecture/)

Looking for best Research Assignment Help. Whatsapp us at +16469488918 or chat with our chat representative showing on lower right corner or order from here. You can also take help from our Live Assignment helper for any exam or live assignment related assistance.