EVALUATION OF SECURE SOFTWARE DEVELOPMENT PROCESSES TO PROTECT PERSONAL DATA.pdf

EVALUATION OF SECURE SOFTWARE DEVELOPMENT PROCESSES OF PROTECTION OF PERSONAL DATA

Authors

  • Merve VAROL ARISOY Mehmet Akif Ersoy University

Keywords:

Cyber kill chain, KVKK, Secure Software Development, Software Engineering

Abstract

In this study, it was provided to evaluate the secure software development processes in terms of cyber-attack methodology to ensure the security of personal data. In cyber-attacks that may occur against personal data, processes such as vulnerability detection before the attack, determination of the intervention method according to the attack stage during the attack, and analysis of the damage measurement of personal data after the attack can be carried out by making use of models such as the cyber death chain scheme. In order to take precautions against cyber-attacks during software development, it is necessary to know the attack methodologies well. Thanks to models such as the cyber kill chain, missing points can be detected, and the method of responding to the next attack can be decided during the software development process according to the attack stage at the time of the attack.

Downloads

Published

30-12-2021