Show simple item record

dc.contributor.advisorCostin, Andrei
dc.contributor.authorMuranen, Markus
dc.date.accessioned2019-11-06T06:55:50Z
dc.date.available2019-11-06T06:55:50Z
dc.date.issued2019
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/66197
dc.description.abstractUse of third-party software packages has become increasingly popular in software projects. Reusing source code via packages can help developers focus on writing the parts of the software that are unique to their application and relying on third-party source code to solve common problems that have already been solved by others. However, the use of packages does not come without risks. By introducing a dependency on someone else’s code, members of software project teams should recognize and be aware of security implications and risks associated with such decisions. Usually such decisions are opaque and made on ad-hoc basis by individuals taking part in the software project. This thesis aims to introduce a set of principles for managing and remediating security problems associated with software packages. The principles are tied to a software development lifecycle and processes by introducing various steps that can be incorporated as software package management process and workflow to existing and new software projects.en
dc.format.extent68
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subject.othersecure package management
dc.subject.otherpackage management
dc.subject.othersoftware packages
dc.subject.otherSDLC
dc.subject.otherDevOps
dc.subject.otherDevSecOps
dc.titleSecurity principles for package management as part of software development lifecycle and processes
dc.identifier.urnURN:NBN:fi:jyu-201911064741
dc.type.ontasotPro gradu -tutkielmafi
dc.type.ontasotMaster’s thesisen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.laitosInformaatioteknologiafi
dc.contributor.laitosInformation Technologyen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.oppiaineTietojenkäsittelytiedefi
dc.contributor.oppiaineComputer Scienceen
dc.rights.copyrightJulkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.fi
dc.rights.copyrightThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.en
dc.type.publicationmasterThesis
dc.contributor.oppiainekoodi601
dc.subject.ysotietokoneohjelmat
dc.subject.ysokyberturvallisuus
dc.subject.ysoohjelmistokehitys
dc.subject.ysocomputer programmes
dc.subject.ysocyber security
dc.subject.ysosoftware development
dc.format.contentfulltext
dc.rights.accessrightsTekijä ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyväskylän yliopiston kirjaston arkistotyösemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..fi
dc.rights.accessrightsThe author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).en
dc.type.okmG2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record