Reducing Software Security Risk through an Integrated Approach
نویسندگان
چکیده
This paper discusses new joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the sojiware development and maintenance life cycle. The assessment instrument is a collection of tools and procedures to support development of secure sojiware. The toolset initially will have a Vulnerability Matrix (VMatrix) with severity, flequency, platford application, and signatureBela3 in a database keyed on the Computer Vulnerability Enumeration (CVE) number. The toolset also will include a property-based testing tool to slice sojiware code looking for specific vulnerabilities using signatures from the VMatrix. A third component of the research underlying this toolset will be an investigation into the verij&ation of sojiware designs for compliance to security properties. This is based on model checking approaches initially researched together with analytical verijkation of formal specification.
منابع مشابه
An Integrated Approach to Reducing Information Technology (IT) Security Risk in the Software Life Cycle A White Paper Proposal
1. Introduction Jet Propulsion Laboratory (JPL) was funded by the NASA Office of Safety and Mission Assurance (OSMA) with a Center Initiative, " Reducing Software Security Risk through an Integrated Approach " (RSSR). A partner on this initiative is the University of California at Davis (UC Davis). The Initiative is a formal approach to addressing Information Technology (IT) security through th...
متن کاملThe Development of an Integrated Psychotherapy Model based on Religious-Psychological Teachings with Islamic Approach and Evaluating its Effectiveness on Reducing the Tendency to High-Risk Behaviors in Adolescents
Objective: The aim of this study was to develop an integrated psychotherapy model based on religious-psychological teachings with Islamic approach and evaluate its effectiveness on reducing the tendency to high-risk behaviors (tendency to use alcohol, drug, and cigarette) in adolescents. Method: The present study was quasi-experimental with pretest-posttest design with a control group. The stat...
متن کاملUsing Software Security Analysis to Verify the Secure Socket Layer (SSL) Protocol
The National Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative “Reducing Software Security Risk (RSS...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملAutomating Threat Modeling through the Software Development Life-Cycle
Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important steps of this process, a...
متن کاملA Graph-Theoretic Visualization Approach to Network Risk Analysis
This paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits and system vulnerabilities to provide a connected graph representing possible cyber-attack paths within a given network. Our visualization approa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000