EVALUATION OF SECURE SOFTWARE DEVELOPMENT PROCESSES TO PROTECT PERSONAL DATA.pdf
EVALUATION OF SECURE SOFTWARE DEVELOPMENT PROCESSES OF PROTECTION OF PERSONAL DATA
Keywords:Cyber kill chain, KVKK, Secure Software Development, Software Engineering
In this study, it was provided to evaluate the secure software development processes in terms of cyber-attack methodology to ensure the security of personal data. In cyber-attacks that may occur against personal data, processes such as vulnerability detection before the attack, determination of the intervention method according to the attack stage during the attack, and analysis of the damage measurement of personal data after the attack can be carried out by making use of models such as the cyber death chain scheme. In order to take precautions against cyber-attacks during software development, it is necessary to know the attack methodologies well. Thanks to models such as the cyber kill chain, missing points can be detected, and the method of responding to the next attack can be decided during the software development process according to the attack stage at the time of the attack.
Copyright (c) 2022 International Journal of Applied Sciences and Computational Engineering
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.