Software Assurance CBK and University Curricula Matt Bishop Sophie Engle.

Slides:



Advertisements
Similar presentations
Engineering Medical Information Systems
Advertisements

Conceptual Graph Analysis Chapter 20 Lori Nuth | EDIT 730 | Fall 2005.
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
2 The key challenge to maintain a robust petroleum industry is ensuring an adequate supply of well trained professionals now and in future The development.
Roles and Functions of the Community and Public Health Nurse
Cyber Education Project Accreditation Committee November 2014.
So Many Possibilities Dr. Vic MaconachyChris Inglis Capitol Technology University U. S. Naval Academy CAE Community Meeting, - Columbia, Maryland Accreditations.
Educational Outcomes: The Role of Competencies and The Importance of Assessment.
First, let’s talk about some of your introductions from last time: – What did you think was good about it? – What did you think was poor about it? What.
Research Methodology for Applied Economics
Stony Brook Model for General Education Assessment Pilot Report November 13, 2003 GEAR as a Catalyst for Change Beginning to Build a Campus- Wide Culture.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Methods For The Prevention, Detection And Removal Of Software Security Vulnerabilities Jay-Evan J. Tevis Department of Computer Science and Software Engineering.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Iowa Core Alignment of Instructional Content to the Iowa Core Sue Updegraff Keystone AEA.
Software Architecture premaster course 1.  Israa Mosatafa Islam  Neveen Adel Mohamed  Omnia Ibrahim Ahmed  Dr Hany Ammar 2.
Minia Univresity Council for Education Affairs Meeting - July Higher Education Enhancement Project Fund (HEEPF) Improving Transportation Engineering.
15 th Conference on Software Engineering Education and Training Foundation Software Engineering Practices for Capstone Projects and Beyond Annegret Goold.
CHAPTER Introduction: The Role, History, and Direction of Management Accounting Chapter 1 -
Updating the Guidelines for Undergraduate Programs in Statistics Nicholas Horton (Amherst College) November 12, 2013 CAUSE Teaching.
Jeremy Hall Nicholas Jones Wouter Poortinga An Exploration of Assessment Practices at Cardiff University’s Schools of Engineering, Psychology and the Centre.
Day 1 Session 2/ Programme Objectives
Computer Crime and Information Technology Security
Dr. Ronald J. Anderson, Texas A&M International University 1 Chapter 5 Designs for Problem Solving Teaching with Technology: Designing Opportunities to.
Lesson Planning. Teachers Need Lesson Plans So that they know that they are teaching the curriculum standards required by the county and state So that.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
OHT 23.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The benefits of use of standards The organizations involved in standards.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1 The proposed UK computing masters benchmark 5th TEMPUS JEP Meeting Belgrade April 26/27.
Computer Science: $ign of the Times Karen Reed CSIS 1001/sec.06 PowerPoint Presentation
1 -1 An electronic presentation by Douglas Cloud Pepperdine University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
TRAINING AND DEVELOPMENT CHAPTER 3 Learning and training Presented by MALIHA PARACHA 2579.
1 Introduction to Software Engineering Lecture 1.
Designing Assessments into Activities that Meet Learning Goals Michelle Hall-Wallace.
Apply Quality Management Techniques Project Quality Processes Certificate IV in Project Management Qualification Code BSB41507 Unit Code BSBPMG404A.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
CSCE 548 Secure Software Development Security Operations.
BSBPMG404A Apply Quality Management Techniques Apply Quality Management Techniques Project Quality Processes C ertificate IV in Project Management
IR 202 Research Methods This course aims to introduce students what is social research, what are the different types of research and the research process.
Impact of the New ASA Undergraduate Curriculum Guidelines on the Hiring of Future Undergraduates Robert Vierkant Mayo Clinic, Rochester, MN.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Seeking Behavior and Information Literacy Among Business Majors Casey Long Business Liaison Librarian University Library Georgia State University,
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Computer Architecture Organization and Architecture
An electronic presentation by Douglas Cloud Pepperdine University
Using core competencies in curriculum design
Day 1 Session 2/ Programme Objectives
Performance Management -Uttam Acharya
AACSB’s Standard 9: Curriculum content
Accepted Students Program
CIS 333 Competitive Success/snaptutorial.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
ACM/IEEE-CS Computer Science Curriculum
IS4550 Security Policies and Implementation
Information Technology (IT)
OBE & Accreditation {Role in Excellence in Education}
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Computer System Security
Presentation transcript:

Software Assurance CBK and University Curricula Matt Bishop Sophie Engle

2 Contact Us Matt Bishop Sophie Engle Department of Computer Science University of California at Davis One Shields Ave. Davis, CA

3 SwACBK No standard or agreed-upon body of knowledge for software assurance education DHS, DoD began effort to define CBK in 2004 “to provide an inclusive list of the knowledge needed to acquire, develop, and sustain secure software” Also “to help … academia target [its] education and training curricula”

4 Goal of Talk Suggest changes in this SwACBK that will make it more useful as a basis for curriculum development Restructure to emphasize principles More comprehensive framework to base levels of abstraction on Include more seminal references

5 Background Academic curriculum emphasizes principles, concepts UC Davis: “courses should present an integrated body of knowledge, with primary emphasis upon elucidation of principles and theories rather than upon the development of skills and techniques” Why: students must be prepared for wide variety of environments (gov’t, industry, personal, etc.); technologies will differ, but foundations, concepts, principles the same

6 Secure Software §5.2.5: interdependence of components “[s]ecurity inspired requirements on nature and attributes of computing hardware, infrastructure, or other externally available services must be explicitly recorded as requirements or assumptions and assured” §8 (Secure Software Verifcation, Validation, and Evaluation): No discussion of requirements, assumptions; implication is once validated, software can be moved anywhere and still be safe

7 Orientation Parts of SwACBK overlook non- governmental requirements §2.2: background on risks, threats Examples focus on government agencies, national security; industry mentioned in an aside; academia ignored §7.2.1: list of sources of vulnerabilities, patches Omits SecurityFocus, OSVDB, X- Force

8 Classifications Taxonomies non-rigorous, confusing §6.7 (Architectures for Security): “Reference monitors”, “layered”, “system high”, “filters, guardians, firewalls” §2.4 (Methods for attacks): Against operating system; against software; against physical system

9 Basis and Depth Too little on concepts, principles Saltzer & Schroeder, plus “Defense in depth”, “Analyzability” Models: no integrity models; only confidentiality Bell-LaPadula model Malicious logic: Trojan horse = backdoor Reference monitor: mentioned 4 times, not explained in detail Trade-off between dynamic, static analysis

10 Motivation Motivates importance of software security Often omits motivation for individual facets of software assurance §9.5 (Static Analysis) Says techniques conservative, “making worst case assumptions to ensure the soundness of the analysis” May or may not be true (which is worse, false positives or false negatives?)

11 References 6 references to before 1985 One mention of collection of historical, seminal papers Should add references to seminal works Reference monitors in Anderson (1974), but only 2003 book cited Trojan horse in same report, but cites book from 2005 Miss much of reason for, richness of, term

12 Use in Higher Education Undergraduate education Should emphasize reinforcement in all courses, not just software engineering courses Graduate education Suggests using training guidance for incoming grad students No mention of teaching principles Focuses on acquiring skills to develop secure software

13 Improving SwACBK Separate functionality from assurance Organize chapters around principles Leads to good classifications Examples from industry, academia Including personal security Choose original reference sources Say why each reference is there Expand discussion of principles, concepts Much more on reference monitors, etc.

14 Conclusion Long way to go before SwACBK useful as basis for academic curriculum Excellent that this discussion has started Now need to do it right!