Preview

Software Security

Powerful Essays
Open Document
Open Document
4565 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Software Security
Proceedings of the 10th Colloquium for Information Systems Security Education University of Maryland, University College Adelphi, MD June 5-8, 2006

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum
Stephen S. Yau, Fellow, IEEE, and Zhaoji Chen Arizona State University, Tempe, AZ 85287-8809 {yau, zhaoji.chen@asu.edu}

Abstract – In addition to enable students to understand the theories and various analysis and design techniques, an effective way of improving students’ capabilities of developing secure software is to develop their capabilities of using these theories, techniques and effective tools in the security software development process. In this paper, the development and delivery of a graduate-level course on secure software engineering with the above objective at Arizona State University are presented. The developing process, stimulating techniques and tools used in this course, as well as lessons learned from this effort, are discussed. Index terms – Information assurance, software security, secure software engineering, graduate curriculum, course, theory, techniques, tools, course project, and lessons learned.

network-based security approaches, like firewalls and signature-based anti-spyware, have been shown ineffective to achieve secure software. Furthermore, fixing software after release is very costly. The later the security is addressed in the development cycle, the costlier it becomes: one dollar required to resolve an issue during the design phase grows into 60 to 100 dollars to resolve the same issue after the software is shipped [5]. It is obvious that a better way to achieve secure software is to incorporate security in the software starting from the beginning of the development process. However, because software developers tend to focus the cost and time on meeting well-specified functional requirements and leave security issues for maintenance in the infamous penetrate and patch manner



References: [1] M. Howard and D. LeBlanc, “Writing Secure Code”, Microsoft Press, 2001. [2] CERT Coordination Center, CERT/CC statistics 19882005. Available at: http://www.cert.org/stats/cert_stats.html [3] National Institute of Standards and Technology, “Software Errors Cost U.S. Economy $59.5 Billion Annually” (NIST2002-10). Available at: http://www.nist.gov/public_affairs/releases/n02-10.htm [4] Gary McGraw, “Software Security”, IEEE Security & Privacy, vol. 2(2), 2004, pp. 80-83. [5] K.S. Hoo, A.W. Sudbury, and A.R. Jaquith, “Tangible ROI Through Secure Software Engineering”, Secure Business Quarterly, vol.1(2), 2001. [6] J. Viega and G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way?, Addison-Wesley, 2001 [7] S. Barnum and G. McGraw, “Knowledge for Software Security”, IEEE Security & Privacy, vol. 3(2), 2005, pp. 74-78. [8] NSA, “National IA Education & Training Program”, Available at: http://www.nsa.gov/ia/academia/cnsstesstandards.cfm [9] CSE591 Software Security at: http://enpub.fulton.asu. edu/iacdev/courses/CSE591s/home.html [10] G. Hoglund and G. McGraw, “Exploiting Software: How to break code”, Addison-Wesley, 2004 ISBN 1-933510-98-6/$15.00 © 2006 CISSE 130

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Module 11 Final Exam

    • 1584 Words
    • 7 Pages

    Security vulnerabilities can prompt huge monetary misfortunes. Also, the expense of altering the vulnerability climbs exponentially as a provision advances through its improvement lifecycle. In view of the provision 's criticality and the affectability of the information it handles, inner reviewers may utilize an abnormal amount outline review, discovery test, or source code survey to assess the requisition 's security controls. These methodologies likewise could be consolidated to bring about an exceedingly compelling and exhaustive provision security audit.…

    • 1584 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    WGU Personal Statement

    • 265 Words
    • 2 Pages

    As a recent graduate of WGU Master of Information Security and Assurance, I know the importance of good Mentoring and communication to the success of students, and I welcome the challenge of being part of the team keeping WGU’s students engaged and successful. In addition to my information security credentials (CISSP, CHFI, CEH, Security +) and personal qualities, I have a solid background in teaching information technology in the classroom face-to-face, hybrid, and online.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays