Chapter 18: Introduction to Assurance

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Lecture # 2 : Process Models
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
1 Chapter 4 - Part 1 Software Processes. 2 Software Processes is: Coherent (logically connected) sets of activities for specifying, designing, implementing,
The software process A software process is a set of activities and associated results which lead to the production of a software product. This may involve.
Chapter 2 – Software Processes
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #18-1 Chapter 18: Introduction to Assurance Overview Why assurance? Trust and.
6/17/2015 5:35 PM Lecture 11: Assurance James Hook CS 591: Introduction to Computer Security.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
May 25, 2004ECS 235Slide #1 Amplifying Allows temporary increase of privileges Needed for modular programming –Module pushes, pops data onto stack module.
Planning and Tracking Software Quality Yordan Dimitrov Telerik Corporation
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 30, 2003 Network Security Assurance Lecture.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
INTROSE Introduction to Software Engineering Raymund Sison, PhD College of Computer Studies De La Salle University Software: Definitions,
1 Advanced Computer Programming Project Management: Software Life Cycle Copyright © Texas Education Agency, 2013.
CSI315 Web Applications and Technology Overview of Systems Development (342)
Chapter 2 The process Process, Methods, and Tools
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
IS2150/TEL2910: Introduction of Computer Security1 Nov 15, 2005 Assurance.
Topic (1)Software Engineering (601321)1 Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
1 Software Engineering Ian Sommerville th edition Instructor: Mrs. Eman ElAjrami University Of Palestine.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 2 – Software Processes Lecture 1 Chapter 2 Software Processes1.
Slide #18-1 Introduction to Assurance CS461/ECE422 Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and Science.
Faculty Economics & Business EBS 2033 Systems Development Lecture 1 The Systems Development Environment Lecturer: Puan Asleena Helmi.
Advanced Software Engineering Dr. Cheng
CompSci 280 S Introduction to Software Development
CHALLENGER DISASTER : CASE STUDY – TO BE
Chapter 1 The Systems Development Environment
INTRODUCTION TO SOFTWARE ENGINEERING
Chapter 17 Building Secure and Trusted Systems
Introduction to Assurance
Prototyping in the software process
An Introduction to Software Engineering
Software Engineering Management
Software Prototyping.
Chapter 1 The Systems Development Environment
MISY 301 Mr.Mohammed Rafeeque.
Chapter 1: Introduction to Systems Analysis and Design
Introduction to Assurance
Introduction to Assurance
Chapter 18 Maintaining Information Systems
Chapter 1- Introduction
Software Life Cycle “What happens in the ‘life’ of software”
Chapter 1 The Systems Development Environment
The Systems Engineering Context
SNS College of Engineering Coimbatore
Software Processes (a)
Chapter 6: Design of Expert Systems
Chapter 1 The Systems Development Environment
Object oriented system development life cycle
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
Frequently asked questions about software engineering
Chapter 1 The Systems Development Environment
Frequently asked questions about software engineering
Software Development Process
An Overview of Software Processes
Software Engineering Software Engineering is the science and art of
CHAPTER 10 METHODOLOGIES FOR CUSTOM SOFTWARE DEVELOPMENT
CS385T Software Engineering Dr.Doaa Sami
Chapter 1: Introduction to Systems Analysis and Design
Software Engineering Software Engineering is the science and art of
Introduction to Assurance
INFS 452 – Computer Ethics & Society
Chapter # 7 Software Development
Chapter 1 The Systems Development Environment
DOE Review of the LCLS Project October 2006
Chapter 1: Introduction to Systems Analysis and Design
Presentation transcript:

Chapter 18: Introduction to Assurance Overview Why assurance? Trust and assurance Life cycle and assurance June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Trust Trustworthy entity has sufficient credible evidence leading one to believe that the system will meet a set of requirements Trust is a measure of trustworthiness relying on the evidence Assurance is confidence that an entity meets its security requirements based on evidence provided by applying assurance techniques June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Relationships June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Problem Sources Requirements definitions, omissions, and mistakes System design flaws Hardware implementation flaws, such as wiring and chip flaws Software implementation errors, program bugs, and compiler bugs System use and operation errors and inadvertent mistakes Willful system misuse Hardware, communication, or other equipment malfunction Environmental problems, natural causes, and acts of God Evolution, maintenance, faulty upgrades, and decommissions June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Examples Challenger explosion Sensors removed from booster rockets to meet accelerated launch schedule Deaths from faulty radiation therapy system Hardware safety interlock removed Flaws in software design Bell V22 Osprey crashes Failure to correct for malfunctioning components; two faulty ones could outvote a third Intel 486 chip Bug in trigonometric functions June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Role of Requirements Requirements are statements of goals that must be met Vary from high-level, generic issues to low-level, concrete issues Security objectives are high-level security issues Security requirements are specific, concrete issues June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Types of Assurance Policy assurance is evidence establishing security requirements in policy is complete, consistent, technically sound Design assurance is evidence establishing design sufficient to meet requirements of security policy Implementation assurance is evidence establishing implementation consistent with security requirements of security policy June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Types of Assurance Operational assurance is evidence establishing system sustains the security policy requirements during installation, configuration, and day-to-day operation Also called administrative assurance June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Life Cycle June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Life Cycle Conception Manufacture Deployment Fielded Product Life June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Conception Idea Decisions to pursue it Proof of concept See if idea has merit High-level requirements analysis What does “secure” mean for this concept? Is it possible for this concept to meet this meaning of security? Is the organization willing to support the additional resources required to make this concept meet this meaning of security? June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Manufacture Develop detailed plans for each group involved May depend on use; internal product requires no sales Implement the plans to create entity Includes decisions whether to proceed, for example due to market needs June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Deployment Delivery Assure that correct masters are delivered to production and protected Distribute to customers, sales organizations Installation and configuration Ensure product works appropriately for specific environment into which it is installed Service people know security procedures June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Fielded Product Life Routine maintenance, patching Responsibility of engineering in small organizations Responsibility may be in different group than one that manufactures product Customer service, support organizations Retirement or decommission of product June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Waterfall Life Cycle Model Requirements definition and analysis Functional and non-functional General (for customer), specifications System and software design Implementation and unit testing Integration and system testing Operation and maintenance June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Relationship of Stages June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle model Other life cycle models June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Models Exploratory programming Develop working system quickly Used when detailed requirements specification cannot be formulated in advance, and adequacy is goal No requirements or design specification, so low assurance Prototyping Objective is to establish system requirements Future iterations (after first) allow assurance techniques June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Models Formal transformation Create formal specification Translate it into program using correctness-preserving transformations Very conducive to assurance methods System assembly from reusable components Depends on whether components are trusted Must assure connections, composition as well Very complex, difficult to assure June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Models Extreme programming Rapid prototyping and “best practices” Project driven by business decisions Requirements open until project complete Programmers work in teams Components tested, integrated several times a day Objective is to get system into production as quickly as possible, then enhance it Evidence adduced after development needed for assurance June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop

Computer Security: Art and Science Key Points Assurance critical for determining trustworthiness of systems Different levels of assurance, from informal evidence to rigorous mathematical evidence Assurance needed at all stages of system life cycle June 1, 2004 Computer Security: Art and Science ©2002-2004 Matt Bishop