Maintaining Software with a Security Perspective

نویسندگان

  • Kanta Jiwnani
  • Marvin V. Zelkowitz
چکیده

Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and are difficult to use. Hence it is essential to focus testing effort in areas that have a greater number of security vulnerabilities to develop secure software as well as meet budget and time constraints. We propose a testing strategy based on a classification of vulnerabilities to develop secure and stable systems. This taxonomy will enable a system testing and maintenance group to understand the distribution of security vulnerabilities and prioritize their testing effort according to the impact the vulnerabilities have on the system. This is based on Landwehr’s classification scheme for security flaws and we evaluated it using a database of 1360 operating system vulnerabilities. This analysis indicates vulnerabilities tend to be focused in relatively few areas and associated with a small number of software engineering issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of the Strategic Importance of the Strait of Hormuz in the Middle East, with an Emphasis on Iran's Role in Maintaining its Security

The Middle East has always been of interest to other countries for its geopolitical position and its vast supply of oil and gas. Meanwhile, the issue of the transfer of oil by sea is of great importance. The Strait of Hormuz is perhaps one of the most important blue-water in the world due to the geographical location of the Persian Gulf to the Free Seas. The world's superpowers, like the United...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Security and Privacy Enhancing in Multi-Cloud Architecture with Data De-Duplication

Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies to host their own servers and purchase of expensive software. On the other hand there arise many new types of cyber theft. The main concerns in cloud computing are data integrit...

متن کامل

Challenges in Secure Software Evolution - The Role of Software Architecture

Achieving quality properties for software systems and maintaining them during evolution is challenging. Especially, security properties often degrade during software evolution. This is often not noticed and can lead to monetary loss and serious damage to the company’s image. Approaches for maintaining security properties exist but fail to exploit the knowledge of the architectural design phase....

متن کامل

The role of childhood trauma, time perspective and experiential avoidance on Post Traumatic Stress Disorder: Applying of Structural Equation Modeling

Background & aim: Given the likelihood of recurrence of symptoms of posttraumatic stress disorder (PTSD) and the inadequacy of therapeutic approaches in the lasting recovery of symptoms of this disorder, the precise identification of the factors involved in initiating and maintaining PTSD is very important. Time perspectives can be considered as another conceptualization applied recently for st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002