VI. CONCLUSION AND FUTURE WORKS
In this experimental case study toward the secure software engineering, the third year students used FDD
model. We have found out that FDD has the potentials to adapt with the secure development life cycle. Based on our
observations, we can say that it is possible that FDD could manage well with security of security of software if this
model is carefully analyzed and implemented with some of the security practices, plan the right tool, add more iterations
between the phases of FDD and use mind map tool, to get a clearer view of the whole progress in the planning phase.
We noticed that, even if the students that were still new in developing a secure system and never heard off or
familiarized with the secure software development could pull off with little difficulty. However, we noticed that FDD
needs to be remodeled to clearly define the process towards
secure software development. Sometimes, the current
defined roles in FDD are not sufficient. After these
improvements, we think that the large scale secure systems
(including in the industry sector) would have no problem in
developing secured software. Thus, in our future we intend
to propose security phase and security master role for FDD.