8,772 research outputs found

    Development of Secure Software : Rationale, Standards and Practices

    Get PDF
    The society is run by software. Electronic processing of personal and financial data forms the core of nearly all societal and economic activities, and concerns every aspect of life. Software systems are used to store, transfer and process this vital data. The systems are further interfaced by other systems, forming complex networks of data stores and processing entities.This data requires protection from misuse, whether accidental or intentional. Elaborate and extensive security mechanisms are built around the protected information assets. These mechanisms cover every aspect of security, from physical surroundings and people to data classification schemes, access control, identity management, and various forms of encryption. Despite the extensive information security effort, repeated security incidents keep compromising our financial assets, intellectual property, and privacy. In addition to the direct and indirect cost, they erode the trust in the very foundation of information security: availability, integrity, and confidentiality of our data. Lawmakers at various national and international levels have reacted by creating a growing body of regulation to establish a baseline for information security. Increased awareness of information security issues has led to extend this regulation to one of the core issues in secure data processing: security of the software itself. Information security contains many aspects. It is generally classified into organizational security, infrastructure security, and application security. Within application security, the various security engineering processes and techniques utilized at development time form the discipline of software security engineering. The aim of these security activities is to address the software-induced risk toward the organization, reduce the security incidents and thereby lower the lifetime cost of the software. Software security engineering manages the software risk by implementing various security controls right into the software, and by providing security assurance for the existence of these controls by verification and validation. A software development process has typically several objectives, of which security may form only a part. When security is not expressly prioritized, the development organizations have a tendency to direct their resources to the primary requirements. While producing short-term cost and time savings, the increased software risk, induced by a lack of security and assurance engineering, will have to be mitigated by other means. In addition to increasing the lifetime cost of software, unmitigated or even unidentified risk has an increased chance of being exploited and cause other software issues. This dissertation concerns security engineering in agile software development. The aim of the research is to find ways to produce secure software through the introduction of security engineering into the agile software development processes. Security engineering processes are derived from extant literature, industry practices, and several national and international standards. The standardized requirements for software security are traced to their origins in the late 1960s, and the alignment of the software engineering and security engineering objectives followed from their original challenges to the current agile software development methods. The research provides direct solutions to the formation of security objectives in software development, and to the methods used to achieve them. It also identifies and addresses several issues and challenges found in the integration of these activities into the development processes, providing directly applicable and clearly stated solutions for practical security engineering problems. The research found the practices and principles promoted by agile and lean software development methods to be compatible with many security engineering activities. Automated, tool-based processes and the drive for efficiency and improved software quality were found to directly support the security engineering techniques and objectives. Several new ways to integrate software engineering into agile software development processes were identified. Ways to integrate security assurance into the development process were also found, in the form of security documentation, analyses, and reviews. Assurance artifacts can be used to improve software design and enhance quality assurance. In contrast, detached security engineering processes may create security assurance that serves only purposes external to the software processes. The results provide direct benefits to all software stakeholders, from the developers and customers to the end users. Security awareness is the key to more secure software. Awareness creates a demand for security, and the demand gives software developers the concrete objectives and the rationale for the security work. This also creates a demand for new security tools, processes and controls to improve the efficiency and effectiveness of software security engineering. At first, this demand is created by increased security regulation. The main pressure for change will emanate from the people and organizations utilizing the software: security is a mandatory requirement, and software must provide it. This dissertation addresses these new challenges. Software security continues to gain importance, prompting for new solutions and research.Ohjelmistot ovat keskeinen osa yhteiskuntamme perusinfrastruktuuria. MerkittÀvÀ osa sosiaalisesta ja taloudellisesta toiminnastamme perustuu tiedon sÀhköiseen kÀsittelyyn, varastointiin ja siirtoon. NÀitÀ tehtÀviÀ suorittamaan on kehitetty merkittÀvÀ joukko ohjelmistoja, jotka muodostavat mutkikkaita tiedon yhteiskÀytön mahdollistavia verkostoja. Tiedon suojaamiseksi sen ympÀrille on kehitetty lukuisia suojamekanismeja, joiden tarkoituksena on estÀÀ tiedon vÀÀrinkÀyttö, oli se sitten tahatonta tai tahallista. Suojausmekanismit koskevat paitsi ohjelmistoja, myös niiden kÀyttöympÀristöjÀ ja kÀyttÀjiÀ sekÀ itse kÀsiteltÀvÀÀ tietoa: nÀitÀ mekanismeja ovat esimerkiksi tietoluokittelut, tietoon pÀÀsyn rajaaminen, kÀyttÀjÀidentiteettien hallinta sekÀ salaustekniikat. Suojaustoimista huolimatta tietoturvaloukkaukset vaarantavat sekÀ liiketoiminnan ja yhteiskunnan strategisia tietovarantoj ettÀ henkilökohtaisia tietojamme. Taloudellisten menetysten lisÀksi hyökkÀykset murentavat luottamusta tietoturvan kulmakiviin: tiedon luottamuksellisuuteen, luotettavuuteen ja sen saatavuuteen. NÀiden tietoturvan perustusten suojaamiseksi on laadittu kasvava mÀÀrÀ tietoturvaa koskevia sÀÀdöksiÀ, jotka mÀÀrittÀvÀt tietoturvan perustason. LisÀÀntyneen tietoturvatietoisuuden ansiosta uusi sÀÀnnöstö on ulotettu koskemaan myös turvatun tietojenkÀsittelyn ydintÀ,ohjelmistokehitystÀ. Tietoturva koostuu useista osa-alueista. NÀitÀ ovat organisaatiotason tietoturvakÀytÀnnöt, tietojenkÀsittelyinfrastruktuurin tietoturva, sekÀ tÀmÀn tutkimuksen kannalta keskeisenÀ osana ohjelmistojen tietoturva. TÀhÀn osaalueeseen sisÀltyvÀt ohjelmistojen kehittÀmisen aikana kÀytettÀvÀt tietoturvatekniikat ja -prosessit. Tarkoituksena on vÀhentÀÀ ohjelmistojen organisaatioille aiheuttamia riskejÀ, tai poistaa ne kokonaan. Ohjelmistokehityksen tietoturva pyrkii pienentÀmÀÀn ohjelmistojen elinkaarikustannuksia mÀÀrittÀmÀllÀ ja toteuttamalla tietoturvakontrolleja suoraan ohjelmistoon itseensÀ. LisÀksi kontrollien toimivuus ja tehokkuus osoitetaan erillisten verifiointija validointimenetelmien avulla. TÀmÀ vÀitöskirjatutkimus keskittyy tietoturvatyöhön osana iteratiivista ja inkrementaalista ns. ketterÀÀ (agile) ohjelmistokehitystÀ. Tutkimuksen tavoitteena on löytÀÀ uusia tapoja tuottaa tietoturvallisia ohjelmistoja liittÀmÀllÀ tietoturvatyö kiinteÀksi osaksi ohjelmistokehityksen prosesseja. Tietoturvatyön prosessit on johdettu alan tieteellisestÀ ja teknillisestÀ kirjallisuudesta, ohjelmistokehitystyön vallitsevista kÀytÀnnöistÀ sekÀ kansallisista ja kansainvÀlisistÀ tietoturvastandardeista. Standardoitujen tietoturvavaatimusten kehitystÀ on seurattu aina niiden alkuajoilta 1960-luvulta lÀhtien, liittÀen ne ohjelmistokehityksen tavoitteiden ja haasteiden kehitykseen: nykyaikaan ja ketterien menetelmien valtakauteen saakka. Tutkimuksessa esitetÀÀn konkreettisia ratkaisuja ohjelmistokehityksen tietoturvatyön tavoitteiden asettamiseen ja niiden saavuttamiseen. Tutkimuksessa myös tunnistetaan ongelmia ja haasteita tietoturvatyön ja ohjelmistokehityksen menetelmien yhdistÀmisessÀ, joiden ratkaisemiseksi tarjotaan toimintaohjeita ja -vaihtoehtoja. Tutkimuksen perusteella iteratiivisen ja inkrementaalisen ohjelmistokehityksen kÀytÀntöjen ja periaatteiden yhteensovittaminen tietoturvatyön toimintojen kanssa parantaa ohjelmistojen laatua ja tietoturvaa, alentaen tÀten kustannuksia koko ohjelmiston yllÀpitoelinkaaren aikana. Ohjelmistokehitystyön automatisointi, työkaluihin pohjautuvat prosessit ja pyrkimys tehokkuuteen sekÀ korkeaan laatuun ovat suoraan yhtenevÀt tietoturvatyön menetelmien ja tavoitteiden kanssa. Tutkimuksessa tunnistettiin useita uusia tapoja yhdistÀÀ ohjelmistokehitys ja tietoturvatyö. LisÀksi on löydetty tapoja kÀyttÀÀ dokumentointiin, analyyseihin ja katselmointeihin perustuvaa tietoturvan todentamiseen tuotettavaa materiaalia osana ohjelmistojen suunnittelua ja laadunvarmistusta. ErillisinÀ nÀmÀ prosessit johtavat tilanteeseen, jossa tietoturvamateriaalia hyödynnetÀÀn pelkÀstÀÀn ohjelmistokehityksen ulkopuolisiin tarpeisiin. Tutkimustulokset hyödyttÀvÀt kaikkia sidosryhmiÀ ohjelmistojen kehittÀjistÀ niiden tilaajiin ja loppukÀyttÀjiin. Ohjelmistojen tietoturvatyö perustuu tietoon ja koulutukseen. Tieto puolestaan lisÀÀ kysyntÀÀ, joka luo tietoturvatyölle konkreettiset tavoitteet ja perustelut jo ohjelmistokehitysvaiheessa. Tietoturvatyön painopiste siirtyy torjunnasta ja vahinkojen korjauksesta kohti vahinkojen rakenteellista ehkÀisyÀ. KysyntÀ luo tarpeen myös uusille työkaluille, prosesseille ja tekniikoille, joilla lisÀtÀÀn tietoturvatyön tehokkuutta ja vaikuttavuutta. TÀllÀ hetkellÀ kysyntÀÀ luovat lÀhinnÀ lisÀÀntyneet tietoturvaa koskevat sÀÀdökset. PÀÀosa muutostarpeesta syntyy kuitenkin ohjelmistojen tilaajien ja kÀyttÀjien vaatimuksista: ohjelmistojen tietoturvakyvykkyyden taloudellinen merkitys kasvaa. Tietoturvan tÀrkeys tulee korostumaan entisestÀÀn, lisÀten tarvetta tietoturvatyölle ja tutkimukselle myös tulevaisuudessa

    Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security

    Get PDF
    Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard in 1997. We are using our beloved wireless internet connection for everything and are connecting more and more devices into our wireless networks in every form imaginable. As the number of wireless network devices keeps increasing, so does the importance of wireless network security. During its now over twenty-year life cycle, a multitude of various security measures and protocols have been introduced into WLAN connections to keep our wireless communication secure. The most notable security measures presented in the 802.11 standard have been the encryption protocols Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both encryption protocols have had their share of flaws and vulnerabilities, some of them so severe that the use of WEP and the first generation of the WPA protocol have been deemed irredeemably broken and unfit to be used for WLAN encryption. Even though the aforementioned encryption protocols have been long since deemed fatally broken and insecure, research shows that both can still be found in use today. The purpose of this Master’s Thesis is to develop a process for surveying wireless local area networks and to survey the current state of WLAN security in Finland. The goal has been to develop a WLAN surveying process that would at the same time be efficient, scalable, and easily replicable. The purpose of the survey is to determine to what extent are the deprecated encryption protocols used in Finland. Furthermore, we want to find out in what state is WLAN security currently in Finland by observing the use of other WLAN security practices. The survey process presented in this work is based on a WLAN scanning method called Wardriving. Despite its intimidating name, wardriving is simply a form of passive wireless network scanning. Passive wireless network scanning is used for collecting information about the surrounding wireless networks by listening to the messages broadcasted by wireless network devices. To collect our research data, we conducted wardriving surveys on three separate occasions between the spring of 2019 and early spring of 2020, in a typical medium-sized Finnish city. Our survey results show that 2.2% out of the located networks used insecure encryption protocols and 9.2% of the located networks did not use any encryption protocol. While the percentage of insecure networks is moderately low, we observed during our study that private consumers are reluctant to change the factory-set default settings of their wireless network devices, possibly exposing them to other security threats

    The surveyor’s role in monitoring, mitigating, and adapting to climate change

    Get PDF

    Adapting the Surveying Curriculum to New Dimensions of the Profession

    Get PDF
    Today the surveying profession is very different from what it was twenty years ago. Recent technological innovations, globalization, and global land-related challenges have allowed a wide range of advances in the surveying profession. The vision is to promote surveying practices that can enhance the quality of services in a variety of tracks in the land profession. According to the new adjacent professional areas and the needs of the labor market, academic courses for surveyors have to be adapted to meet the broader scope of the surveying profession and to supply highly qualified land professionals. This paper outlines the new challenges for the surveying profession and highlights the core skills, competencies, and knowledge that should be highly valued to produce competent experts. Furthermore, this paper suggests a common structure of a surveying curriculum to capture the new academic themes for better adaptation to the broader scope of the surveying profession

    CIB International Conference 2014: W55/65/89/92/96/102/117 & TG72/74/81/83 Construction in a changing world: Book of Abstracts

    Get PDF
    It is no exaggeration to say that CIB is the world's foremost platform for international cooperation and information exchange in the area of building and construction research and innovation. What takes place at CIB events is the very essence of CIB's raison d'ĂȘtre and, outside the triennial CIB Congress, an unprecedented number of CIB working commissions and task groups are represented at this Conference and we have worked to facilitate interaction with a rich mix of specialist streams, opportunities for informal networking and a series of challenging keynotes. With its focus of “Construction in a Changing World”, the Conference provides a forum for researchers worldwide to debate and exchange ideas and experiences on a broad range of issues. Driven by technology innovation, demographic growth, environmental change, a new economic order and a strong undercurrent of social and political desire for change, the world is changing quickly. Construction doesn’t exist in isolation and, in a fast-changing world, the sector has the vital role of providing the requisite built environment to meet the challenges presented by these changes. In order to deliver value, maintain competitiveness and address the needs of society, the construction industry will need to develop its capabilities for managing innovation and technical change. The Conference will bring together resources and knowledge across different fields, technologies and disciplines to deal with the major challenges that construction professionals will be confronted with in the coming years

    Sustaining the motivation of quantity surveyors in facing the competitive environment

    Get PDF
    The construction industry is complex and is frequently associated with occupational stress. Following this, the employees’ motivation is important as it affects job performance. Motivated employees tend to be better at their jobs as they find and create initiatives to achieve their goals. In the construction industry, quantity surveyors are highly involved in the contractual and financial management of projects. The increasingly challenging environment has changed their work method, causing various significant impacts on performance. This paper explored the impact and effectiveness of motivation on quantity surveyors from three types of organisations in Malaysia; government agencies, private consultancy firms, and private contracting firms. A mixed-methodology was adapted, which included questionnaire surveys and a semi-structured interview with quantity surveyors registered with the Board of Quantity Surveyors Malaysia (BQSM). The findings demonstrated that ‘good relations amongst staff and management team’ sparked motivation the most, reflecting that it is the most effective motivational practice in many organisations
    • 

    corecore