Saturday, December 28, 2019

Risk Assessment Of Software And Mobile Application

Abstract This is completed after the first final draft has been completed The rate of technology changes is faster than ever. The new cutting edge technologies in software world solve many problems and make our life easy. At the same time, they provide many unseen risk. We need to ensure that steps taken and technology used to build software or mobile application do not create additional risk in future. Most risk analysis process is based on theoretical concept to identify and assesses the risk. In this paper we analysis two formula based risk analysis approaches in mobile and software application namely WHYPER framework and DempsterSchafer theory. Risk management is a process of risk identification, risk assessment and developing counter†¦show more content†¦Software and mobile applications are integral part of everyday life. With globalization, the 24x7 accessibility of data has increased the threat of data loss because attackers are always ready to steal your data. Software that we are using, internet banking using a network, a smart phone that we use for calling and texting, storing data at cloud etc involves risk. Data is a big factor of risk in software and mobile usage. Many researchers investigated lifecycle of risk analysis and risk management. With the growing technology in mobile and software applications the traditional risk management does not solve all the problems associated with modern security attacks. Many small scale organizations do not implement the risk lifecycle for software or mobile application because implementing risk assessment is costly. As a result, not only the organizations which have developed the applications the individual who use them can fall prey to attackers. The IT organization as well as customer poses a great risk. In risk analysis my primary goal is to identify the sources of risk, impact of risk as well as assessing these risks in software and mobile application devices from organization to individual level. The next step is to estimate the uncertainty and complete the risk analysis model. Therefore, the purpose of this paper is to study the risk analysis and risk management of software and mobile device

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.