Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.

Slides:



Advertisements
Similar presentations
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Advertisements

2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Course: e-Governance Project Lifecycle Day 1
SUCCESSFUL PROGRAM DEVELOPMENT STRATEGIES Solid research base is lacking Solid research base is lacking Hundreds of literature prescribe how to develop.
Problem Based Learning: Its Use in the Nursing Skills Lab AFACCT Annual Conference, January 12-13, 2006 Lisa Gotschall, MS, RN, CS Kathy Martin, MS, RN,
CSCU 411 Software Engineering Chapter 2 Introduction to Software Engineering Management.
CSCE 522 Building Secure Software. CSCE Farkas2 Reading This lecture – McGraw: Ch. 3 – G. McGraw, Software Security,
Secure Software Development Software Security Touchpoints Chapter 3 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
11 th International Symposium Loss Prevention and Process Safety Promotion in the Process Industries 1 OECD Workshop on Sharing Experience in the Training.
Deploy or Die: A choice for Application-Led Ubiquitous Computing Research Richard Sharp Intel Research, Cambridge.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Developing new strategies for behavior change Susan Zimicki The CHANGE Project/AED Presented at the USAID SOTA course, June 2000.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
1 Pertemuan 19 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
8 Managing Risk Teaching Strategies
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
The Many Contexts of Software Architecture
+ Hybrid Roles in Your School If not now, then when?
Software Reuse Course: # The Johns-Hopkins University Montgomery County Campus Fall 2000 Lecture # 1 - September 7, 2004.
Secure Software Development Chapter 2 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Secure Software Development SW Penetration Testing Chapter 6 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Secure Software Development Risk-Based Security Testing Chapter 7 Rasool Jalili & A. Boorghani Dept. of Computer Engineering Spring 2012.
SCOTT KURODA ADVISOR: DR. FRANZ KURFESS Encouraging Secure Programming Practice in Academia.
Developing an IS/IT Strategy
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Resources to Support Training Programs for CSIRTs.
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
CSCE 548 Secure Software Development Test 1 Review.
Business Analysis and Essential Competencies
CSCE 548 Code Review. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 4 – Recommended: Best Practices for Peer Code Review,
Management information systems. Management information systems, and shortened (in English: MIS), is a type of information technology and computer is.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
Risk Management for Technology Projects Geography 463 : GIS Workshop May
SCSC 311 Information Systems: hardware and software.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Learning outcomes for BUSINESS INFORMATCIS Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST)
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
1 Chapter 5 Project management. 2 Project management : Is Organizing, planning and scheduling software projects.
University of Southern California Center for Systems and Software Engineering Model-Based Software Engineering Supannika Koolmanojwong Spring 2013.
CSCE 522 Secure Software Development Best Practices.
©Ian Sommerville 2004 Software Engineering. Chapter 21Slide 1 Chapter 21 Software Evolution.
CSCE 548 Secure Software Development Security Operations.
CSCE 201 Secure Software Development Best Practices.
PRESENTATION AT THE TECHNOLOGICAL UNIVERSITIES QUALITY FRAMEWORK Professor Sarah Moore, Chair, National Forum for the Enhancement of Teaching and Learning.
COMPONENT 2: TRAINING ON ADAPTATION AND MITIGATION Vũ Thế Thường Training Officer June 10, 2009.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Secure Software Development Abuse Cases Chapter 8 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
INTRODUCTION TO COGNITIVE SCIENCE NURSING INFORMATICS CHAPTER 3 1.
PROBLEM SOLVING. STEPS IN PROBLEM SOLVING  Problem Definition.  Problem Analysis.  Generating possible Solutions.  Analyzing the Solutions.  Evaluation:
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
ASSESSING YOUR KNOWLEDGE AND SKILLS February 2, 2016 First Tuesday.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CSCE 548 Secure Software Development Penetration Testing.
CSCE 548 Secure Software Development Security Operations
Overview of IT Auditing
Risk Management for Technology Projects
Succeeding as a Systems Analysts
Security Engineering.
CSCE 548 Secure Software Development Test 1 Review
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
10 Stages Of the Engineering Design Process
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Drew Hunt Network Security Analyst Valley Medical Center
Standard for Teachers’ Professional Development July 2016
Presentation transcript:

Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010

Software Security 2 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 The disconnection between security and development  SW development efforts that lack any sort of understanding of technical security risks.  Need recommendations to solve this problem by bridging the gap between two disparate fields. Approach is born out of experience in two diverse fields; SW security and Information security. The disconnection between security and development  SW development efforts that lack any sort of understanding of technical security risks.  Need recommendations to solve this problem by bridging the gap between two disparate fields. Approach is born out of experience in two diverse fields; SW security and Information security. Security Operations

Software Security 3 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 Best practices in software security, (touchpoints) include a manageable number of simple security activities that are to be applied throughout any software development process. Even the best development efforts can fail to take into account real-world attacks previously observed on similar application architectures. Information security staff-- have spent years responding to attacks against real systems and thinking about the vulnerabilities that generated them. However, few information security professionals are software developers, at least on a full-time basis, These two communities of highly skilled technology experts exist in isolation. But, their knowledge and experience bases,, are largely complementary. Best practices in software security, (touchpoints) include a manageable number of simple security activities that are to be applied throughout any software development process. Even the best development efforts can fail to take into account real-world attacks previously observed on similar application architectures. Information security staff-- have spent years responding to attacks against real systems and thinking about the vulnerabilities that generated them. However, few information security professionals are software developers, at least on a full-time basis, These two communities of highly skilled technology experts exist in isolation. But, their knowledge and experience bases,, are largely complementary.

Software Security 4 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 The issue is: how information security professionals can best participate in the software development process. Some recommendations relevant to both software developers and information security practitioners. The idea is to describe how best to influence the complementary aspects of the two disciplines. Requirements: Abuse Cases; –Involving infosec in abuse case development. –Many abuse case analysis efforts begin with brainstorming or "whiteboarding" sessions –Infosec people are likely to find that the software developers are unaware of many of the attack forms seen every day out beyond the network perimeter. –Do not overstate the attacks that you've seen and studied! The issue is: how information security professionals can best participate in the software development process. Some recommendations relevant to both software developers and information security practitioners. The idea is to describe how best to influence the complementary aspects of the two disciplines. Requirements: Abuse Cases; –Involving infosec in abuse case development. –Many abuse case analysis efforts begin with brainstorming or "whiteboarding" sessions –Infosec people are likely to find that the software developers are unaware of many of the attack forms seen every day out beyond the network perimeter. –Do not overstate the attacks that you've seen and studied!

Software Security 5 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 Design: Business Risk Analysis; –Info Security people? Design: Architectural Risk Analysis; assesses the technical security coverage in an application's proposed design and links these to business impact. –For architectural risk analysis to be effective, security analysts must possess a great deal of technology knowledge covering both the application and its underlying platform, frameworks, languages, functions, libraries, and so on. –Information security can help by providing perspective to the conversation. All software has potential weaknesses, but has component X been involved in actual attacks? Test Planning: Security Testing –Thinking like a good guy is not enough. –Wearing your black hat and thinking like a bad guy is critical. –infosec professionals who are good at thinking like bad guys are the most valuable resources. Design: Business Risk Analysis; –Info Security people? Design: Architectural Risk Analysis; assesses the technical security coverage in an application's proposed design and links these to business impact. –For architectural risk analysis to be effective, security analysts must possess a great deal of technology knowledge covering both the application and its underlying platform, frameworks, languages, functions, libraries, and so on. –Information security can help by providing perspective to the conversation. All software has potential weaknesses, but has component X been involved in actual attacks? Test Planning: Security Testing –Thinking like a good guy is not enough. –Wearing your black hat and thinking like a bad guy is critical. –infosec professionals who are good at thinking like bad guys are the most valuable resources.

Software Security 6 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 Implementation: Code Review –By its very nature, code review requires knowledge of code. An infosec practitioner with little experience writing and compiling software is going to be of little use during a code review. System Testing: Penetration Testing –Need them definitely. Fielded System: Deployment and Operations –Need them. Implementation: Code Review –By its very nature, code review requires knowledge of code. An infosec practitioner with little experience writing and compiling software is going to be of little use during a code review. System Testing: Penetration Testing –Need them definitely. Fielded System: Deployment and Operations –Need them.

Software Security 7 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 Close cooperation with the development organization is essential to success. Infosec can be supposed as the security police; regardless of your attention, you are being notified, even if you believe having no problem. SW security appears to be in the earliest stages of development, much as the field of information security itself was ten years or so ago. Close cooperation with the development organization is essential to success. Infosec can be supposed as the security police; regardless of your attention, you are being notified, even if you believe having no problem. SW security appears to be in the earliest stages of development, much as the field of information security itself was ten years or so ago. Come Together

Software Security 8 Secure SW Development (SSD) Grad. Course (R. Jalili & M.S. Dousti ) – Fall 2010 End