146 research outputs found

    A Literature Survey of the Development Processes for Secure Software

    Get PDF
    Turvalise tarkvara arendusprotsessidel on tĂ€htis roll turvalise tarkvara kavandamisel, aga erinevate arendusprotsessidel vahel on rakse valikut teha ilma nendevahelie vĂ”rdluseta. Veel enam peale arendusprotsessi rakendamist tuleb valida meetodid, mida kasutada selle arendusprotsessi rakendamisel. Meetodite valikul tekib aga probleem, sest arendusprotsessides ei ole öeldud, milliseid meetodeid tuleks kasutada, et tĂ€ita vajalikud tegevused turvalise tarkvara arendamiseks. Selle töö raames me vĂ”rdleme kolme erinevat turvalise tarkvara arendusprotsessi: Microsoft Security Development Lifecycle, OWASP CLASP ja Cigital’s Security Touchpoints. JĂ€rgmisena me keskendume valitud arendusprotsesside faasile, mis kĂ€sitleb turvariskide haldust ja viime lĂ€bi uuringu, et teada saada, mis on tĂ€napĂ€evased turvariski meetodid. Me anname nendest meetoditest lĂŒhikokkuvĂ”tte ja vĂ”rdleme neid omavahel, mis loodetavasti lihtustab nende vahel valimist. Me koostame veel leitud meetoditest ĂŒhise vaate, mis aitab kaasa kĂ”igi arendusprotsesside poolt pakutud tegevuste tĂ€itmisele selle faasis. See on vajalik, sest riskihaldus mĂ€ngib suurt rolli turvalise tarkvara arendamisel ja erinevate riskihaldus meetodite kombineerimist saab kasutada, et avastada rohkem riske loodavast tarkvarast ja hiljem neid riske korrektselt leevendada.Secure software development processes are critical part of designing secure software. However, it is hard for the various stakeholders to make the decision about which software development process to choose without a comparison between them. Even further, after choosing the process, stakeholders have to decide which methods and techniques to use to fulfil activities required to develop secure software development processes. This is a problem, because there are a number of methods a stakeholder could use to fulfil these activities, but no explicit links between a method and development process. In this thesis firstly we perform comparison of three secure system development approaches namely Microsoft Security Development Lifecycle, OWASP CLASP and Cigital’s Security Touchpoints. In the next step we focus on step within these approaches, namely the security risk management and carry out an analytical survey to find out current methods for security risk management. We give a short overview and comparison between found methods, which potentially will help stakeholders to select their approach for designing secure software with the focus on security risk analysis. We also provide them with opportunity to perform all activities required in risk analysis phase of the development by giving them an aggregate view of risk management methods. This is essential, because risk analysis is a major part of developing secure software and combining different techniques can be used to discover and mitigate more risks in software under development

    A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    Get PDF
    In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to\ud satisfy the most important ones. We propose to link explicitly security\ud requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a\ud basis for comparing the importance of different security requirements.\ud A conceptual framework is presented, where the relationships between\ud business vision, critical impact factors and valuable assets (together with\ud their security requirements) are shown

    A Literature Survey of the Development Processes for Secure Software

    Get PDF
    Turvalise tarkvara arendusprotsessidel on tĂ€htis roll turvalise tarkvara kavandamisel, aga erinevate arendusprotsessidel vahel on rakse valikut teha ilma nendevahelise vĂ”rdluseta. Veel enam peale arendusprotsessi rakendamist tuleb valida meetodid, mida kasutada selle arendusprotsessi rakendamisel. Meetodite valikul tekib aga probleem, sest arendusprotsessides ei ole öeldud, milliseid meetodeid tuleks kasutada, et tĂ€ita vajalikud tegevused turvalise tarkvara arendamiseks. Selle töö raames me vĂ”rdleme kolme erinevat turvalise tarkvara arendusprotsessi: Microsoft Security Development Lifecycle, OWASP CLASP ja Cigital’s Security Touchpoints. JĂ€rgmisena me keskendume valitud arendusprotsesside faasile, mis kĂ€sitleb turvariskide haldust ja viime lĂ€bi uuringu, et teada saada, mis on tĂ€napĂ€evased turvariski meetodid. Me anname nendest meetoditest lĂŒhikokkuvĂ”tte ja vĂ”rdleme neid omavahel, mis loodetavasti lihtsustab nende vahel valimist. Me koostame veel leitud meetoditest ĂŒhise vaate, mis aitab kaasa kĂ”igi arendusprotsesside poolt pakutud tegevuste tĂ€itmisele selle faasis. See on vajalik, sest riskihaldus mĂ€ngib suurt rolli turvalise tarkvara arendamisel ja erinevate riskihaldus meetodite kombineerimist saab kasutada, et avastada rohkem riske loodavast tarkvarast ja hiljem neid riske korrektselt leevendada.Secure software development processes are critical part of designing secure software. However, it is hard for the various stakeholders to make the decision about which software development process to choose without a comparison between them. Even further, after choosing the process, stakeholders have to decide which methods and techniques to use to fulfil activities required to develop secure software development processes. This is a problem, because there are a number of methods a stakeholder could use to fulfil these activities, but no explicit links between a method and development process. In this thesis firstly we perform comparison of three secure system development approaches namely Microsoft Security Development Lifecycle, OWASP CLASP and Cigital’s Security Touchpoints. In the next step we focus on step within these approaches, namely the security risk management and carry out an analytical survey to find out current methods for security risk management. We give a short overview and comparison between found methods, which potentially will help stakeholders to select their approach for designing secure software with the focus on security risk analysis. We also provide them with opportunity to perform all activities required in risk analysis phase of the development by giving them an aggregate view of risk management methods. This is essential, because risk analysis is a major part of developing secure software and combining different techniques can be used to discover and mitigate more risks in software under development

    Risk and Business Goal Based Security Requirement and Countermeasure Prioritization

    Get PDF
    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans. Currently companies achieve this by means of checklist-based security assessments, but these methods are a way to achieve consensus without being able to provide justifications of countermeasures in terms of business goals. But such justifications are needed to operate securely and effectively in networked businesses. In this paper, we first compare a Risk-Based Requirements Prioritization method (RiskREP) with some requirements engineering and risk assessment methods based on their requirements elicitation and prioritization properties. RiskREP extends misuse case-based requirements engineering methods with IT architecture-based risk assessment and countermeasure definition and prioritization. Then, we present how RiskREP prioritizes countermeasures by linking business goals to countermeasure specification. Prioritizing countermeasures based on business goals is especially important to provide the stakeholders with structured arguments for choosing a set of countermeasures to implement. We illustrate RiskREP and how it prioritizes the countermeasures it elicits by an application to an action case

    Design and Implementation of a Yoruba Language Mobile Tutor

    Get PDF
    Yoruba is a popular indigenous language in Nigeria alongside Hausa and Igbo. English language is however the main medium of communication especially in schools and institutions of learning. Over the years there has been unhealthy rivalry and competition between English language and the indigenous Nigerian languages with the latter struggling for survival. The rivalry is further worsen by the wide adoption of mobile technology which is mostly bundled with resources written in English language. Young Nigerians who have not been exposed to Yoruba language as their native language often find it difficult to speak, read, learn and write Yoruba language. There is the fear of trading Nigerian indigenous languages for English Language as the main means of communication due to modernization. The focus for this work is to present the design and implementation of an interactive mobile application with basic tutorials in the learning of Yoruba language on handheld devices. The system has features that assist users to do basic translation of English to Yoruba and fundamental tutorials that will enable people to learn, write, read and speak Yoruba language fluently. The application was designed and modelled with Unified Modelling Language and developed using HTML5, JavaScript and CSS. The application runs seamlessly on handheld devices which has a deep level of penetration and adoption in Nigeria

    Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    Get PDF
    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session

    Security through usability: a user-centered approach for balanced security policy requirements.

    Get PDF
    Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolving, well reported threat landscape, the consequences of which have heightened the security awareness of senior managers. On the other hand, the impact of policies extend beyond constraints on desktop computers and laptops; an overly constrained policy may compromise operations or stifle the freedom needed for staff to innovate. Because few people are fired for making a policy too secure, as long as usability continues to be treated as a trade-off quality together with functionality then policies will err on the side of constraint over freedom of action. Existing work argues that balanced security can be achieved using Requirements Engineering best practice. Such approaches, however, treat usability as another class of quality requirement, and prescribed techniques fail to elicit or analyse empirical data with the same richness as those used by usability professionals. There is, therefore, a need to incorporates techniques from HCI into the task of specifying security, but without compromising Requirements Engineering practice. Recent work demonstrated how user-centered design and security requirements engineering techniques can be aligned; this approach was validated using a general system design project, where ample time was available to collect empirical data and run participatory requirements and risk workshops. The question remains whether such an approach scales for eliciting policy requirements where time is an imperative rather than a luxury

    RiskREP: Risk-Based Security Requirements Elicitation and Prioritization

    Get PDF
    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecturebased risk assessment and countermeasure definition and prioritization. Countermeasure prioritization is linked to business goals to achieve and based on cost of countermeasures and their effectiveness in reducing risks. RiskREP offers the potential to elicit complete security countermeasures, but also supports the deliberate decision and documentation of why the security analysis is focused on certain aspects. We illustrate RiskREP by an application to an action case

    Vers une nouvelle génération de définition des exigences de sécurité fondée sur l'utilisation des ontologies

    No full text
    National audienceAu cours de ces derniĂšres annĂ©es, la sĂ©curitĂ© des SystĂšmes d'Information (SI) est devenue une prĂ©occupation importante, qui doit ĂȘtre prise en compte dans toutes les phases de dĂ©veloppement du SI, y compris dans la phase initiale de l'ingĂ©nierie des exigences (IE). Des Ă©tudes rĂ©centes proposent quelques approches utiles pour la dĂ©finition des exigences de sĂ©curitĂ©. Cependant les analystes continuent de souffrir d'un manque important de connaissances sur la sĂ©curitĂ© et sur le domaine d'activitĂ© des entreprises. Les ontologies sont connues pour ĂȘtre des sources riches de ces connaissances. Nous proposons, dans cette recherche, de mobiliser des ontologies dans le processus d'ingĂ©nierie des exigences. Nous voulons montrer que le recours Ă  des ontologies pour supporter ce processus est un facteur clĂ© de succĂšs dans la dĂ©finition d'exigences de sĂ©curitĂ© de haute qualitĂ©
    • 

    corecore