Secure software engineering involves designing, building, and maintaining secure software. It includes methods to identify, mitigate, and prevent security vulnerabilities. Threat modeling analyzes risks and attack vectors for secure software engineering. Input validation, output encoding, and error handling prevent SQL injection and cross-site scripting. Regular security testing, including penetration testing and code reviews, helps secure software engineering find and fix vulnerabilities. Secure software engineering also includes configuration management, deployment, monitoring, and patching to keep software programs secure.
Madhusudan Singh, "Role of Blockchain in Requirement in Engineering," Asia Pacific Requirement Engineering Symposium, Swiss Garden Hotel, Malacca, Malaysia, November, 9th -10th, 2017. [Crossref]
Madhusudan Singh, "Requirement Engineering for Intelligent Vehicles at Safety Perspective", EAI Endorsed Transactions on Smart Cities, Vol. 2, Issue 6, 20.12.2017, ISSN No. 2518-3893. DOI: 10.4108/eai.20-12-2017.153496. http://dx.doi.org/10.4108/eai.20-12-2017.153496 [CrossRef, Publons
Madhusudan Singh, Shiho Kim, "Reconcile Security Requirements for Intelligent Vehicles", 2017 17th International Conference on Control, Automation and System (ICCAS 2017) Ramada Plaza, Jeju, South Korea.
Madhusudan Singh, Shiho Kim, “Safety Requirement Specifications for Connected Vehicles",arXiv:1707.08715v2 [cs.CY], 28 Jul 2017.
“Blockchain Technology in Secure Requirement Engineering” R10 IEEE Computer Society Webinar-2021, Online, 29th Oct. 2021. https://www.youtube.com/watch?v=TG3rUq_pf9c&ab_channel=MadhusudanSingh
"Role of Blockchain in Requirement in Engineering," Asia Pacific Requirement Engineering Symposium, Swiss Garden Hotel, Malacca, Malaysia, November, 9th -10th, 2017. http://asiapacificre.org/APRES2017/keynote_speakers.php