Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security by Design Thomas Zalonis Seth Gainey Neil C. Lee Thomas Zalonis Seth Gainey Neil.

Similar presentations


Presentation on theme: "Security by Design Thomas Zalonis Seth Gainey Neil C. Lee Thomas Zalonis Seth Gainey Neil."— Presentation transcript:

1 Security by Design Thomas Zalonis Seth Gainey Neil C. Lee tgzalonis@gmail.comseth.rylan@gmail.comnclee@edisto.cofc.edu Thomas Zalonis Seth Gainey Neil C. Lee tgzalonis@gmail.comseth.rylan@gmail.comnclee@edisto.cofc.edu

2 Introduction : 1) As more and more aspects of the world become interconnected the range of possible security issues increases. 2) Increases in security issues leads to extra software functionality required to defend against them, which means added complexity and cost. 3) Trade offs between client requested functionality and security issues are made in order to reduce costs. 4) Our goal is to show that, in the long run, an integration of security with all phases of the development process would be more beneficial than treating security as a separate issue. Introduction : 1) As more and more aspects of the world become interconnected the range of possible security issues increases. 2) Increases in security issues leads to extra software functionality required to defend against them, which means added complexity and cost. 3) Trade offs between client requested functionality and security issues are made in order to reduce costs. 4) Our goal is to show that, in the long run, an integration of security with all phases of the development process would be more beneficial than treating security as a separate issue.

3 Overview: 1) Background information: (e.g. What are security requirements? What is their current place in software development?) 2) A more specific explanation of our goal. 3) Present the justifications behind our argument by discussing the benefits of an integrated model. 4) Propose various ways that an integrated model may be achieved through the use of various tools, design strategies and improvements in education. 5) Conclusions and discussions. Overview: 1) Background information: (e.g. What are security requirements? What is their current place in software development?) 2) A more specific explanation of our goal. 3) Present the justifications behind our argument by discussing the benefits of an integrated model. 4) Propose various ways that an integrated model may be achieved through the use of various tools, design strategies and improvements in education. 5) Conclusions and discussions.

4 Background : 1) Security Requirements: “...non-functional constraints on the functional requirements of a system.” (Charles B. Haley et al.) 2) Current state of security requirements: An 'Ad hoc' process, where security issues are typically left out of the early development phases. (e.g. Requirements engineering, design and implementation) Background : 1) Security Requirements: “...non-functional constraints on the functional requirements of a system.” (Charles B. Haley et al.) 2) Current state of security requirements: An 'Ad hoc' process, where security issues are typically left out of the early development phases. (e.g. Requirements engineering, design and implementation)

5 Argument: 1) Security should play an equal role in the requirements engineering process. 2) The merger of security requirements into requirements engineering would then cause security issues to propagate throughout the later development phases. (i.e. Design and implementation) 3) Added cost and complexity issues would be reduced in the long run by accounting for security early on instead of trying to add it later when design and implementation has already finished. Argument: 1) Security should play an equal role in the requirements engineering process. 2) The merger of security requirements into requirements engineering would then cause security issues to propagate throughout the later development phases. (i.e. Design and implementation) 3) Added cost and complexity issues would be reduced in the long run by accounting for security early on instead of trying to add it later when design and implementation has already finished.

6 Justification: Increased reliance on technology It’s a jungle out there Consequences of poor security Justification: Increased reliance on technology It’s a jungle out there Consequences of poor security

7 Ethical Considerations: Privacy vs. Control The Anatomy of a Worm Case Study: Code Red Old Rules and New Technology Ethical Considerations: Privacy vs. Control The Anatomy of a Worm Case Study: Code Red Old Rules and New Technology

8 Mismanaging Risk The Myth of Absolute Security The Balance of Information Security Security and Finance — The Cost of Avoidance Security is not a feature Mismanaging Risk The Myth of Absolute Security The Balance of Information Security Security and Finance — The Cost of Avoidance Security is not a feature

9 Design Strategies and Techniques Model Driven Security (MDS) Aspect-Oriented Programming Software Architecture Model (SAM) Design Strategies and Techniques Model Driven Security (MDS) Aspect-Oriented Programming Software Architecture Model (SAM)

10 Tools Eclipse-based tools Jifclipse SSVChecker UML-based tools UML with Mandatory Access Control UMLsec extension WriteOn Tools Eclipse-based tools Jifclipse SSVChecker UML-based tools UML with Mandatory Access Control UMLsec extension WriteOn

11 Education Integrate system-level issues into all programming courses. Apply patterns at every stage of software development. Use Honeynets as a teaching and research tool. Education Integrate system-level issues into all programming courses. Apply patterns at every stage of software development. Use Honeynets as a teaching and research tool.

12 Conclusion Ignoring security concerns until the maintenance phase leads to greater risks and costly “fixes”. There are tools and resources available to facilitate secure software design. Security should be integrated into all phases of software development. Conclusion Ignoring security concerns until the maintenance phase leads to greater risks and costly “fixes”. There are tools and resources available to facilitate secure software design. Security should be integrated into all phases of software development.


Download ppt "Security by Design Thomas Zalonis Seth Gainey Neil C. Lee Thomas Zalonis Seth Gainey Neil."

Similar presentations


Ads by Google