Guide Research Centre Dr. Snehanshu Saha Department of CSE ProfessorPESIT-South Campus PESIT South Campus Bangalore-560100University: VTU Branch: CSE Multi.

Slides:



Advertisements
Similar presentations
New Product Innovation National Correctional Industries Association Enterprise 2004 March 23, 2004.
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved BUSINESS DRIVEN TECHNOLOGY Chapter Twenty: Developing a 21 st Century.
Chapter 5: Asset Classification
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
IEEE Computer Society Name Title, IEEE Computer Society The community for technology leaders.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
By Collin Smith COBIT Introduction By Collin Smith
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
ISYS3015 Analytical Methods for Information systems professionals Week 3 Lecture 1: Finding the literature.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
 CodeSets Inc. into Healthcare solutions for last 18 year in USA  Technology Aspirations into ERP, CIS, EIMS, DMS in Malaysia, Singapore and India 
“Mitigating Offshoring Risks in a Global Business Environment“
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 19 Developing a 21 st Century Organization.
Copyright © E.Y.Li12015/10/23 Domains of Service Research Eldon Y. Li University Chair Professor Department of MIS National Chengchi University, Taiwan.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
“Enterprise Ireland – Driving Innovation and Competitiveness in Irish Business” 6 th May 2011 Frank Ryan CEO Enterprise Ireland BMW Assembly 2011 Annual.
BUSINESS DRIVEN TECHNOLOGY Developing a 21st Century Organization
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
DE GRUYTER OPEN PUBLISHING PROPOSAL 2January 2016Publishing Proposal.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Trinity Industries, Inc. FEI Presentation May 31, 2012.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Fiona Quinlan Subject Librarian Science & Engineering James Hardiman Library Library Resources for Research MScSED.
New Specialization Training Requirement Available Now: Selling Business Outcomes v
Surveillance and Security Systems Cyber Security Integration.
Cybersecurity as a Business Differentiator
New Product Innovation
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information Security Program
Information Security – Current Challenges
Crisis management related research at
Give Wings to Your Business
TJTS505: Master's Thesis Seminar
EITAC Cybersecurity program and IT Security updates
Agenda Control systems defined
Compliance with hardening standards
Media Management 6/15/2018.
Global Facial Recognition Market Growth rate and Gross Income
Unit 40 International Marketing Unit 40 International Marketing Aim The aim of this unit is to introduce students to a variety of methods organizations.
Book and Journal Publishing
Information Security based on International Standard ISO 27001
Cloud security issues & challenges – public cloud
I have many checklists: how do I get started with cyber security?
Clear Demand Price & Promotion Optimization
EXCLUSIVE TOOLS FOR IMPACTING THE CONFERENCES PROCEEDINGS
Sustainability Corporations, Capital Markets and Global Economy.
Group Meeting Ming Hong Tsai Date :
Information Services Security Management
Balani/iGroup Infotech India Pvt. Ltd.
Effective Risk Management in Decision Making Process
What the heck is a data strategy and why do you need one, now.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Central Library. Presented By Shakil Ahmad Deanship of Library Affairs Imam Abdulrahman Bin Faisal University.
Requirements engineering in Cloud Computing
Presentation transcript:

Guide Research Centre Dr. Snehanshu Saha Department of CSE ProfessorPESIT-South Campus PESIT South Campus Bangalore University: VTU Branch: CSE Multi Layer Security Requirements Elicitation Approach to Improve the Quality of Application Security Intended Date of Ph.D Thesis Submission – Third week of August 2015

Reputed Journal Publications Journal 1: “The Need for Measuring the Quality of Application Security” published by American Society for Quality (ASQ) Journal, Software Quality Professional, Volume 17, Issue 2, March Journal 2 :“Application Security Risk: Assessment and Quantification” Accepted for publication by ISACA Journal ( scopus Index) in Volume 15, Issue 5. Journal 3 :Vulnerability Detection in Security Requirements: Design Thinking and Binarization Based Approach” under minor revisions by Crosstalk, US Defense Journal. Journal 4: A Prolog to Application Resiliency: Generation of Attack Resilient Security Requirements (Manuscript under review by Journal) Journal 5: “Classification, Prioritization and Refinement of Security Requirements: Affinity and Tree Diagram Based Approach”. ( Manuscript under review by Journal)

Introduction Data Apps S/W Network Unauthorized or Authorized access Traditional Focus Needed Focus Threat Attack- Objectives & Impact Objectives Market Manipulation Strategic Advantage In National Defense Economic Advantage In Industry Competitive position In Business Negotiations Damage To Critical infrastructure Politically Driven Cause Impact of security breach Cost of recovery and lost productivity Loss of data Impact on consumer confidence Legal risks Data Leakage, Reputation Damage Regulatory Complications

Our Approach

Quality of Application Security Intending to file for US patent

Application Security Risk: Assessment and Modeling Application Security Risk Metric(ASRM)

Security Requirements the Base to Enhance QAS: Classification, Prioritization, Refinement and Elicitation of Resilient Security Requirements Affinity and Tree Diagram concept

Vulnerability Detection in Security Requirements Design Thinking Binarization Bayesian model Risk reduction

Research Outcome Concept of Quality of application security (QAS) A metric to measure it. Assessment and measurement of application security risk Security requirements a potential base to enhance the quality of application security and to reduce the risk associated with security. The concept of dynamic attack resilient security requirements. Application risk-centric classification and prioritization of security requirements. Application of affinity and tree diagram concept to refine SR from high level to implementation level. Concept and formation of application specific Security Requirements Attributes (SRA) Application of Design Thinking and Binarization process to detect vulnerabilities in SR Vulnerability removal in security requirements phases through conversion of vulnerable SR into Non-Vulnerable SR. Bayes Model for Vulnerability Detection in SR R(α1 | x) = λ11P(ω1 | x) + λ12P(ω2 | x) R(α2 | x) = λ21P(ω1 | x) + λ22P(ω2 | x) Conditional Risk

International Conference Publications A Comprehensive Analysis of Factors Influencing Quality of Requirements. Lecture Notes on Software Engineering, [40] LNSE 2013 Vol.1(2): ISSN: DOI: /LNSE.2013.V1.45. Available at the link: Indexed in EI (INSPEC, IET), DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest and Google ScholarEI (INSPEC, IET)DOAJElectronic Journals Library Software Process Improvement Customization: 3D Flex Model. [41] International Journal of Engineering Research and Technology LNSE (Vol. 2, No. 11 (November-2013)). ESSA Publications. “Customization Of Quality Models In Software Projects To Enhance The Business Value”[42]. In Advance Computing Conference (IACC), 2013 IEEE 3rd International(pp ). Indexed in IEEE Explorer. Citation: This publication is cited by Albeladi, K. S., Khan, U. A., & Khan, P. M. (2014, March). “Driving business value through an effective IT strategy development. In Computing for Sustainable Global Development (INDIACom), 2014 International Conference on (pp ). IEEE. “Impact Analysis of Volatility and Security on Requirements during Software Development Process” [43] International Conference on Software Engineering and Mobile Application Modeling and Development (ICSEMA) 2012, 19th – 21st December, Chennai, India.. Indexed in IEEE Explorer and IET. Digital library "Affinity and Tree Diagrams: A Practical Approach to Control Requirement Volatility in Software Projects" [44]appeared in the international conference CARET 2013 and indexed in Search Digital Library.

International Conference Publications “Optimization Of Conventional Bench Through Virtual Bench Concept “appeared in International conference CSAE2012 held in Pune, India. Indexed in Springer digital library. DOI: Quality Attribute Focused Multilayer Requirement Elicitation: Judicious Approach to Drive Business Value" [46]appeared in ICACCI,an international Conference held in August 13.Indexed in IEEE Citation: This paper is cited by García-Mireles, G. A., Moraga, M. Á., García, F., & Piattini, M. (2015). Approaches to promoting product quality within software process improvement initiatives: A mapping study. Journal of Systems and Software, 103, " Multilayer Security Requirements Model: Effective Collaboration Of Industry Compliance With Application Security In IT Enterprises" appeared in the international conference ICRDPET-2013 "Ability based domain specific training: A pragmatic solution to poor requirement engineering in CMM level 5 companies" [48]appeared in International conference CSAE2012 held in China.Indexed in IEEE DOI: /CSAE ***