Research Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Table 3
Comparison of security test cases between PDWM and other techniques.
| S. No. | Component | Number of security test cases | Number of security test cases identified during software development | PDWM | Secure software patch management | Using SOA | Traditional waterfall development |
| 1 | Make reservation | 6 | 6 | — | 6 | — | 2 | Prepare ticket | — | — | — | — | — | 3 | Make payment | 2 | 2 | — | 2 | — | 4 | Bookings and flight records | 2 | 2 | — | — | — | 5 | Accounting file | 2 | 2 | — | — | — | Total | 12 | 12 | — | 8 | — |
|
|
This signifies the total number of security text cases.
|