This free survey is powered by QUESTIONPRO.COM
0%
Exit Survey »
 
 
Hello:
You are invited to participate in our survey on the software security activities in the Agile development process the result of the survey will help us to analyze and to make comparison among security activities that has been used in different agile projects. This Survey will take approximately 10 -15 minutes to complete the questionnaire.

Your participation in this study is completely voluntary. There are no foreseeable risks associated with this project. However, if you feel uncomfortable answering any questions, you can withdraw from the survey at any point. It is very important for us to learn your opinions.

Your survey responses will be strictly confidential and data from this research will be reported only in the aggregate. Your information will be coded and will remain confidential. If you have questions at any time about the survey or the procedures, you may contact Tigist Eyader at or by email at the address specified below.

Thank you very much for your time and support. Please start with the survey now by clicking on the Continue button below.

 
 
 
Which security activities do you use in order to collect, analyse, and document security requirements? Set the value how it is useful in your project.
1 2 3 4 5 not used
* Security Requirements
* Abuse Cases
* Agree on Definitions
* Role Matrix
* Design Requirements
* Identify Trust boundary
* Identify Global security policy
* Specify Operational Environment
* Identify Attack Surface
*  
 
 
Which security activities do you use in order to prevent design level security flaws? Set the value how it is useful in your project:
1 2 3 4 5 not used
* Risk Analyses
* Assumption Documentation
* Critical Assets
* UML Sec
* Quality Gates
* Cost Analysis
* Attack Surface Reduction
* Security Architecture
* Secure Design Principles
* Countermeasure Graphs
* Requirements Inspection
* Threat Modeling
 
 
Which security activities do you use to detect and prevent the vulnerabilities from being added to the source code? Set the value how it is useful in your project:
1 2 3 4 5 not used
* Static Code Analyses
* Security Tools
* Coding Rules
* Code Review
* Pair Programming
 
 
Which security activities do you use in order to find security flaws in the software? Set the value how it is useful in your project:
1 2 3 4 5 not used
* Vulnerability & Penetration Testing
* Red Team Testing
* Risk Based Testing
* Dynamic Analysis
* Fuzzy Testing
* Security Testing
 
 
Which security activities do you use at the time of release to identify any remaining security flaws and gain confidence over the software ? Set the value how it is useful in your project:
1 2 3 4 5 not used
* External Review
* Repository Improvement
* Incident Response Planning
* Singing the Code
* Operational Planning and Readiness
* Final Security Review
 
 
Do you think the security activities you have selected in the above questions are sufficient to prevent your software from vulnerability? In that case how would you rate your software product security level? (Rating: 1-5, where 1=low secure and 5 = high secure)
 
1
 
2
 
3
 
4
 
5
 
 
 
What do think is the most beneficial using an agile devwlopment process?
   
 
 
 
What do you think is the least beneficial using an Agile development process?
   
 
 
 
What would you recommend? (optional)
   
 
Survey Software Powered by QuestionPro Survey Software