Maintaining Software with a Security Perspective
نویسندگان
چکیده
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and are difficult to use. Hence it is essential to focus testing effort in areas that have a greater number of security vulnerabilities to develop secure software as well as meet budget and time constraints. We propose a testing strategy based on a classification of vulnerabilities to develop secure and stable systems. This taxonomy will enable a system testing and maintenance group to understand the distribution of security vulnerabilities and prioritize their testing effort according to the impact the vulnerabilities have on the system. This is based on Landwehr’s classification scheme for security flaws and we evaluated it using a database of 1360 operating system vulnerabilities. This analysis indicates vulnerabilities tend to be focused in relatively few areas and associated with a small number of software engineering issues.
منابع مشابه
A Survey of the Strategic Importance of the Strait of Hormuz in the Middle East, with an Emphasis on Iran's Role in Maintaining its Security
The Middle East has always been of interest to other countries for its geopolitical position and its vast supply of oil and gas. Meanwhile, the issue of the transfer of oil by sea is of great importance. The Strait of Hormuz is perhaps one of the most important blue-water in the world due to the geographical location of the Persian Gulf to the Free Seas. The world's superpowers, like the United...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity and Privacy Enhancing in Multi-Cloud Architecture with Data De-Duplication
Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies to host their own servers and purchase of expensive software. On the other hand there arise many new types of cyber theft. The main concerns in cloud computing are data integrit...
متن کاملChallenges in Secure Software Evolution - The Role of Software Architecture
Achieving quality properties for software systems and maintaining them during evolution is challenging. Especially, security properties often degrade during software evolution. This is often not noticed and can lead to monetary loss and serious damage to the company’s image. Approaches for maintaining security properties exist but fail to exploit the knowledge of the architectural design phase....
متن کاملThe role of childhood trauma, time perspective and experiential avoidance on Post Traumatic Stress Disorder: Applying of Structural Equation Modeling
Background & aim: Given the likelihood of recurrence of symptoms of posttraumatic stress disorder (PTSD) and the inadequacy of therapeutic approaches in the lasting recovery of symptoms of this disorder, the precise identification of the factors involved in initiating and maintaining PTSD is very important. Time perspectives can be considered as another conceptualization applied recently for st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002