Preview

Sw Security

Powerful Essays
Open Document
Open Document
3001 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sw Security
Building Security In
Editor: Gary McGraw, gem@cigital.com

Software Security

S

oftware security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some

help in understanding how to tackle it. This new department

GARY
MCG RAW
Cigital

80

aims to provide that help by exploring software security best practices.
The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.
The field’s recent appearance is one reason why best practices are neither widely adopted nor obvious.
A central and critical aspect of the computer security problem is a software problem. Software defects with security ramifications—including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling— promise to be with us for years. All too often, malicious intruders can hack into systems by exploiting software defects.1 Internet-enabled software applications present the most common security risk encountered today, with software’s ever-expanding complexity and extensibility adding further fuel to the fire. By any measure, security holes in software are common, and the problem is growing: CERT Coordination
Center identified 4,129 reported vulnerabilities in 2003 (a 70 percent increase over 2002, and an almost fourfold increase since 2001).2,3
Software security best practices
PUBLISHED BY THE IEEE COMPUTER SOCIETY



leverage good software engineering practice and involve thinking about security early in the software life cycle, knowing and understanding common threats (including language-based flaws and pitfalls), designing for security, and subjecting all software artifacts to



References: Code, Addison-Wesley, 2004. Security Workshop,” IEEE Security & Privacy, vol. 1, no. 2, 2003, pp Should Scrap Penetrate-andPatch,” IEEE Aerospace and Electronic Systems, vol. 13, no. 4, 1998, pp 5. L. Walsh, “Trustworthy Yet?” Information Security Magazine, Feb. 2003; http://infosecuritymag.techtarget. 1, 2003, pp. 57–61. Indigo. He also is coauthor of Exploiting Software (Addison-Wesley, 2004), Building Secure Software (Addison-Wesley, 2001), Java Security (John Wiley & Sons, 1996), and four other books

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    Posey, B. (2011, March 11). 10 best practices for windows security. Tech republic, Retrieved from http://www.techrepublic.com/blog/10things/10-best-practices-for-windows-security/2383…

    • 768 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security Plan

    • 492 Words
    • 2 Pages

    • Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    college algebra

    • 1862 Words
    • 11 Pages

    References: Wm. Arthur Conklin, G. W. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition. In G. W. Wm. Arthur Conklin, _Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition_ (p. Chapter 20). McGraw-Hill Company.…

    • 1862 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Security Brutallitay

    • 845 Words
    • 4 Pages

    Before the year 2000 airports were smooth transportation services. People could enter an airport and basically walk right on to their planes without being hassled by airport security. Air travel safety precautions changed dramatically after the September 11, 2001, terrorist attacks that targeted passenger planes in the United States. After many years of upping security in airports, the Transportation Security Administration knew that metal detectors weren’t enough to pick up all dangerous weapons and explosives. In 2007, the Transportation Security Administration began distributing body scanners to use at security checkpoints in airports throughout the United States. Travelers were outraged when they were told the scanners could produce pictures that could see through their clothes. These scanners and new security procedures should not be allowed to be operational in the United States because they invade personal privacy and slow down the flow of travelers.…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Campus Security

    • 596 Words
    • 2 Pages

    It’s two o’clock in the afternoon and your class just gets out. As you are packing up the notebooks on the desk, over the PA system an announcement is made: “lockdown is in effect.” Your phone then goes off with a text message alert from Campus Security, saying that there is a gunman on campus and all buildings are in lockdown. All you wanted to do is get in your car and start the massive paper that your history professor just assigned, but now you are sitting away from windows in a building waiting and hoping that everything is okay. This scenario has happened hundreds of times throughout the last few years across the United States at many colleges. Some end in tragedy, while others of these events do not get any coverage because local authorities and campus security prevent tragedy from occurring. Ocean County College has a very safe campus. It is safe because there are many safety measures put in place by security to keep students safe on campus, Security keeps crime to a minimum, and they have prepared for all safety issues that could happen on campus.…

    • 596 Words
    • 2 Pages
    Good Essays