12 research outputs found

    A Reasoning Framework for Dependability in Software Architectures

    Get PDF
    The degree to which a software system possesses specified levels of software quality attributes, such as performance and modifiability, often have more influence on the success and failure of those systems than the functional requirements. One method of improving the level of a software quality that a product possesses is to reason about the structure of the software architecture in terms of how well the structure supports the quality. This is accomplished by reasoning through software quality attribute scenarios while designing the software architecture of the system. As society relies more heavily on software systems, the dependability of those systems becomes critical. In this study, a framework for reasoning about the dependability of a software system is presented. Dependability is a multi-faceted software quality attribute that encompasses reliability, availability, confidentiality, integrity, maintainability and safety. This makes dependability more complex to reason about than other quality attributes. The goal of this reasoning framework is to help software architects build dependable software systems by using quantitative and qualitative techniques to reason about dependability in software architectures

    Security MythBusters

    Get PDF
    Sound Information Technology (IT) structure is essential in today’s world. Like a recent security breach, HeartBleed, millions of people suffer from a security breach, and spend tremendous amount of time and money to clean up the mess. Well-trained IT professionals not only effectively patch a breach but also prevent possible weakness in advance. GGC endeavors to provide exceptional high-quality learning environments to produce quality IT professionals through out the program, yet still engaging learning opportunity in need to strengthen its program. To enhance learning environment in security, we propose a radically interesting method, SecurityMyth Busters, to provide quality-learning materials in IT courses with research experience to IT major students. The students in the project pick a myth in computer security that many people believes, than research on it to find out it is really possible or not, like in the famous TV series Myth Busters. During the research, students build a computing environment as close as possible and perform hacking as in a myth. Also, students may consult with an IT professional to get some advice to complete their task. All of the activity will be recorded on a video and will be edited to create a classroom material that can be used in classrooms. In this presentation, attendees will gain the knowledge how it has been implemented and how the program achieves to enhancing students learning experiences
    corecore