A Portal for Software Security
نویسندگان
چکیده
software security—remain blithely unaware of their critical role. Without their direct participation, software security will languish. In this installment of Building Security In, we describe a software security portal that the US Department of Homeland Security (DHS) National Cyber Security Division (NCSD) is developing (along with the Carnegie Mellon Software Engineering Institute [SEI] and Cigi-tal). The launch of this portal is scheduled for October 2005 as part of the US-CERT Web site. The portal aims to provide a common, accessible, well-organized set of information for practitioners wishing to do software security. Since 1999, several seminal books have helped define the software security field. 1–3 These books introduced the approach to building security in, which practitioners have since enhanced, expanded, and published in various technical articles, including the Building Security In series (see the sidebar). The core philosophy underlying this approach is that security, like dependability and reliability, can't be added onto a system after the fact through the addition of sets of features , nor can it be tested into a system. Instead, security must be designed and built into a system from the ground up. More than 90 percent of reported security incidents are the result of exploits against defects in the design or code of software, according to the CERT Coordination Center (CERT/CC) of the SEI. Although traditional security efforts attempt to retroactively bolt on devices that make it more difficult for those defects to be exploited, such devices simply aren't effective. Standard-issue software development lifecycle models—ranging from the process-heavy Capabilities Maturity Model (CMM) to the lightweight Extreme Programming (XP) approach—are not focused on creating secure systems. They all exhibit serious shortcomings when the goal is to develop systems with a high degree of assurance. 4 If they even address security issues at all, they're most often relegated to a separate thread of project activity fo-cused on security features; as a result, security is treated as an add-on property. For example, although using applied cryptography (such as SSL) to protect message traffic is a useful security feature, the union of all such security features doesn't ensure secure software. Any isolation of security considerations from primary system-development tasks results in an unfortunate and untenable separation of concerns. Security should be integrated and treated on a par with other system properties. The only way to develop systems with required functionality and performance that can also withstand malicious attacks is to …
منابع مشابه
Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records
Patient portals, such as Myhealthatvanderbilt.com, AdjuvantHealth, Medical Web Experts, are web-based systems that allow both physicians and patients to access and manage patient medical records via the Internet, facilitate clinical workflow and enable data sharing and collaboration. Serving as the front-end to a huge amount of sensitive information (e.g., medical records, billing), the patient...
متن کاملTop Ten Questions To Design A Successful Grid Portal
With the enhancement of Grid application, Grid portal provides a unique interface for end-users to access distributed resources and are used widely in Knowledge Grid, e-Science, e-learning and e-business. A successful Grid portal relies on many factors. This paper focuses primarily on the design aspects of a successful Grid portal implementation. Ten questions of designing Grid portal are discu...
متن کاملApplying a Security Testing Methodology: a Case Study
Security testing is a software testing discipline that aims to verify that the functionality of the software is resistant to attacks and data processed by the software is protected. To establish common requirements that the software must ful ll, software security standards are published. This thesis aims to describe and apply a process necessary to verify the security of a web application. A ch...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملGECEM: A portal-based Grid application for computational electromagnetics
The Grid-Enabled Computational Electromagnetics (GECEM) portal is a problem-solving environment that uses grid technologies to support scientists in accessing distributed resources for the solution of computational electromagnetics (CEM) problems. These resources include input files specifying the system geometry, and proprietary software and hardware for mesh generation and CEM simulation. Thr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Security & Privacy
دوره 3 شماره
صفحات -
تاریخ انتشار 2005