Assurance Cases for Design Analysis of Complex System of Systems Software
|
|
|
- Sheila Fletcher
- 10 years ago
- Views:
Transcription
1 Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr.
2 Problem: SoS are Common, but Difficult Huge systems of systems (SoS) development efforts Have become quite commonplace as aerospace/defense solutions The Global Earth Observation System of Systems (GEOSS) The US Army s Future Combat Systems The US Coast Guard s Deepwater Etc. Exhibit extreme complexity they're hard to underst in detail Are difficult, even impossible, to test adequately using traditional methods Use software as an enabler of SoS functionality Often, SoS elements are dispersed geographically, adding complexity making predictability of behavior difficult How can project management, stakeholders, decision makers achieve some reasonable level of confidence that software for a large-scale, dispersed SoS will meet operational needs, even before development of much of the software? 2
3 Recent Experience Led to Assurance Case Use An SEI team was tasked with answering this question in the face of: the software design was actually many software designs documented in many places with a tremendous volume of data the designs were not yet complete would not be complete until after many production decisions had to be made the need to relate the software to operational needs the desire to base conclusions as much as possible on actual data rather than on optimistic plans confident assertions Constraints short time frame: a project level review had a hard deadline limited availability of personnel, all with varying levels of domain knowledge 3
4 We Had to Relate Operational Needs to Software The top-level SoS requirements were expressed in military terms. A requirements analysis would be repeating work already done Errors in requirements traceability could skew the entire analysis We decided against re-casting the operational needs in terms of software instead analyzed the software contributions to the definitive characterization of those needs the Key Performance Parameters (KPPs). The size of the analysis space, the complexity of the task, the desire to leverage data suggested an assurance case approach The analysis was a structured decomposition of each KPP into more precise statements that could be more readily assessed in terms of evidence. Challenge: be logical consistent but avoid accumulating too much detail Use engineering judgment to leap from higher-level concepts to lower-level ones 4
5 An Assurance Case is a Structured Argument An assurance case is a generalization of a safety case presents an argument (similar to a legal case) that a system has or satisfies some property in a given context requires claims, evidence, an argument linking evidence to claims should be sound complete to justify belief in the main claim should be based on objective evidence Goal Structuring Notation (GSN) graphically presents the argument by showing how claims are broken down into sub-claims until arriving at a sub-claim supported by evidence. Argument Sub-claim 1 Claim Sub-claim 2 Sub-claim 3 Sub-claim 4 For our purposes, we used assurance cases to demonstrate that a SoS software design supported each of the SoS KPPs, as in the claim The SoS will satisfy KPP k Evidence Evidence Evidence 5
6 An Example Assume we re developing a SoS for a DoD project The SoS must exchange information with other systems Our SoS is subject to the Net Ready Key Performance Parameter (NR KPP): The system...must support Net-Centric military operations. The system must be able to enter be managed in the network, exchange data in a secure manner to enhance mission effectiveness. The system must continuously provide survivable, interoperable, secure, operationally effective information exchanges to enable a Net-Centric military capability. Chairman of the Joint Chiefs of Staff Instruction, Interoperability Supportability of Information Technology National Security Systems, CJCSI E,
7 We Can Express the NR KPP Diagrammatically Ctx1 Source Document: CJCSI E Clm1 The system of systems supports Net-Centric military operations Nte1 This diagram focuses on threshold level KPP satisfaction A1 It is assumed that hardware components of the network can be ignored in this analysis. A Clm2 The SoS is able to enter be managed in the network Clm6 The SoS is able to exchange data in a secure manner to enhance mission effectiveness Clm13 The SoS continuously provides survivable, interoperable, secure, operationally effective information exchanges 7
8 Primary Sub-claim #2 Clm2 The SoS is able to enter be managed in the network Clm3 The SoS network conforms to the relevant stards Clm5 The SoS network management software is able to establish, control, terminate connections to the network Clm4 The SoS communications software protocol stack conform to the relevant stards Ev3 documents Ev4 evaluation results Ev5 Results of preliminary field tests experiments Ev1 documents Ev2 Test plans/results related to stards compliance 8
9 Primary Sub-claim #6 Clm6 The SoS is able to exchange data in a secure manner to enhance mission effectiveness Clm7 The security requirements (e.g., data security, information assurance, access control) for the SoS are met Clm11 The SoS supports information exchanges Clm8 Security requirements are identified adequately across the SoS Clm9 Security components within the design are consistent across the SoS Clm10 Verification/validation of SoS security features is adequately planned resourced Clm12 Information to be exchanged is defined Ev12 Results of preliminary field tests experiments Ev6 Requirements database showing security requirements Ev7 design documents Ev8 evaluation results Ev9 Test plans descriptions Ev11 Ev10 Requirements Formally database tracked showing risks information Assurance Cases for SoS transfers Design Analysis 9
10 Primary Sub-claim #13 Clm13 The SoS continuously provides survivable, interoperable, secure, operationally effective information exchanges Clm11 The SoS supports information exchanges Clm14 The SoS information exchanges occur within prescribed timelines Clm12 Information to be exchanged is defined Ev12 Results of preliminary field tests experiments Clm15 Timelines are defined Ev14 Results of preliminary field tests experiments Ev15 Modeling & simulation results Ev16 Formally tracked risks Ev11 Requirements database showing information transfers Ev13 Requirements database showing applicable timelines 10
11 A Diagram Helps Visualize the Completed Case Ctx1 Source Document: CJCSI E Clm1 The system of systems supports Net-Centric military operations Nte1 This diagram focuses on threshold level KPP satisfaction A1 It is assumed that hardware components of the network can be ignored in this analysis. A Clm2 The SoS is able to enter be managed in the network Clm6 The SoS is able to exchange data in a secure manner to enhance mission effectiveness Clm13 The SoS continuously provides survivable, interoperable, secure, operationally effective information exchanges Clm3 The SoS network conforms to the relevant stards Clm5 The SoS network management software is able to establish, control, terminate connections to the network Clm7 The security requirements (e.g., data security, information assurance, access control) for the SoS are met Clm11 The SoS supports information exchanges Clm14 The SoS information exchanges occur within prescribed timelines Clm4 The SoS communications software protocol stack conform to the relevant stards Ev3 documents Ev4 evaluation results Ev5 Results of preliminary field tests experiments Clm8 Security requirements are identified adequately across the SoS Clm9 Security components within the design are consistent across the SoS Clm10 Verification/validation of SoS security features is adequately planned resourced Clm12 Information to be exchanged is defined Ev12 Results of preliminary field tests experiments Clm15 Timelines are defined Ev14 Results of preliminary field tests experiments Ev15 Modeling & simulation results Ev16 Formally tracked risks Ev1 documents Ev2 Test plans/results related to stards compliance Ev6 Requirements database showing security requirements Ev7 design documents Ev8 evaluation results Ev9 Test plans descriptions Ev10 Formally tracked risks Ev11 Requirements database showing information transfers Ev13 Requirements database showing applicable timelines Logic Should Hold Even Without the Diagram 11
12 Scoring Can be Used to Express Risk First, Develop Scoring Rules Then, Work Upward from Evidence 12
13 Scored Diagram Provides a Roadmap Quality of the Evidence Drives Assessment of Claims Relative Risk 13
14 Assurance Cases are Helpful in the SoS Space Assurance cases gave us a way of organizing a nebulous task gave us a means of selecting among innumerable artifacts to study. They brought order to complexity. Due to time constraints we had to focus on big picture risks A more thorough analysis might have identified additional risks or strong points The assurance case technique is a powerful tool for analyzing large complex SoS software design. It provides a means of taking a crosscutting look at SoS It gives managers answers about design progress that are rooted in facts data instead of opinions based upon hope best intentions. 14
15 Contact Information Stephen Blanchette, Jr. Senior Member of the Technical Staff Acquisition Support Program Telephone: U.S. mail: Software Engineering Institute 4500 Fifth Avenue Pittsburgh, PA USA World Wide Web: Customer Relations Telephone: SEI Phone: SEI Fax:
16 NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at This work was created in the performance of Federal Government Contract Number FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part in any manner, to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
Monitoring Trends in Network Flow for Situational Awareness
Monitoring Trends in Network Flow for Situational Awareness SEI CERT NetSA 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering
Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES
A Systematic Method for Big Data Technology Selection
A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
Contracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
UFO: Verification with Interpolants and Abstract Interpretation
: Verification with Interpolants and Abstract Interpretation and Sagar Chaki Software Engineering Institute Carnegie Mellon University Aws Albarghouthi, Yi i and Marsha Chechik University of Toronto A
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
CMMI: What do we need to do in Requirements Management & Engineering?
Colin Hood Page 1 of 11 : What do we need to do in Requirements Management & Engineering? Colin Hood HOOD Group February 2003 : What do we need to do in Requirements Management & Engineering?... 1 1 Abstract...
Network Analysis with isilk
Network Analysis with isilk Presented at FloCon 2011 Ron Bandes CERT Network Situational Awareness (NetSA) Group 2011 Carnegie Mellon University 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL
CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan Arcade Game Team July 2003 Unlimited distribution subject to the copyright. This work is sponsored by the U.S. Department of Defense.
Common Testing Problems: Pitfalls to Prevent and Mitigate
: Pitfalls to Prevent and Mitigate AIAA Case Conference 12 September 2012 Donald Firesmith Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 Clarification and Caveat
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Mary Anne Herndon, SAIC Robert Moore, SAIC Mike Phillips, Software
Agile Development and Software Architecture: Understanding Scale and Risk
Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration
Data Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
How To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver [email protected] Sean Hutchison [email protected] January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
A Framework for Categorizing Key Drivers of Risk
A Framework for Categorizing Key Drivers of Risk Christopher J. Alberts Audrey J. Dorofee April 2009 TECHNICAL REPORT CMU/SEI-2009-TR-007 ESC-TR-2009-007 Acquisition Support Program Unlimited distribution
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Author Richard A. Caralli Principle Contributors James F. Stevens Charles M. Wallen, Financial Services Technology
The Key to Successful Monitoring for Detection of Insider Attacks
The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:
Steve Masters (SEI) SEPG North America March 2011. 2011 Carnegie Mellon University
Using Organizational Business Objectives to Guide a Process Improvement Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 (SEI) SEPG North America March 2011 Agenda
Introduction to the OCTAVE Approach
Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee
Penetration Testing Tools
Penetration Testing Tools Ken van Wyk January 2007 ABSTRACT: This article provides a primer on the most commonly used tools for traditional penetration testing. (A related article provides an overview
Extending AADL for Security Design Assurance of the Internet of Things
Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering
CERT Virtual Flow Collection and Analysis
CERT Virtual Flow Collection and Analysis For Training and Simulation George Warnagiris 2011 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Information Asset Profiling
Information Asset Profiling Author James F. Stevens Principal Contributors Richard A. Caralli Bradford J. Willke June 2005 Networked Systems Survivability Program Unlimited distribution subject to the
Service Measurement Index Framework Version 2.1
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
VoIP in Flow A Beginning
VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors
Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors Donald R. Beynon, Jr. January 2007 Technical Note CMU/SEI-2007-TN-004
The CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
Guidelines for Developing a Product Line Concept of Operations
Guidelines for Developing a Product Line Concept of Operations Sholom Cohen August 1999 TECHNICAL REPORT CMU/SEI-99-TR-008 ESC-TR-99-008 Pittsburgh, PA 15213-3890 Guidelines for Developing a Product Line
Guidelines for Developing a Product Line Production Plan
Guidelines for Developing a Product Line Production Plan Gary Chastek John D. McGregor June 2002 TECHNICAL REPORT CMU/SEI-2002-TR-006 ESC-TR-2002-006 Pittsburgh, PA 15213-3890 Guidelines for Developing
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5000.70 May 10, 2012 Incorporating Change 1, Effective March 19, 2014 USD(AT&L) SUBJECT: Management of DoD Modeling and Simulation (M&S) Activities References:
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03 Editors: Jack Cooper Matthew Fisher March 2002 TECHNICAL REPORT CMU/SEI-2002-TR-010 ESC-TR-2002-010 Pittsburgh, PA 15213-3890 Software
CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT -RMM), both developed at Carnegie
SOA in an Electronic Health Record Product Line
SOA in an Electronic Health Record Product Line Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Sholom Cohen June 2009 What this Talk is About Agile modeling A story The
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
CMM SM -Based Appraisal for Internal Process Improvement (CBA IPI): Method Description
Technical Report CMU/SEI-96-TR-007 ESC-TR-96-007 CMM SM -Based Appraisal for Internal Process Improvement (CBA IPI): Method Description Donna K. Dunaway Steve Masters April 1996 Technical Report CMU/SEI-96-TR-007
What methods are used to conduct testing?
What is testing? Testing is the practice of making objective judgments regarding the extent to which the system (device) meets, exceeds or fails to meet stated objectives What the purpose of testing? There
Testing a Software Product Line
Testing a Software Product Line John D. McGregor December 2001 TECHNICAL REPORT CMU/SEI-2001-TR-022 ESC-TR-2001-022 Pittsburgh, PA 15213-3890 Testing a Software Product Line CMU/SEI-2001-TR-022 ESC-TR-2001-022
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20
Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed
GNU LIBRARY GENERAL PUBLIC LICENSE. Preamble
GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process Richard A. Caralli James F. Stevens Lisa R. Young William R. Wilson May 2007 TECHNICAL REPORT CMU/SEI-2007-TR-012
Technical Report CMU/SEI-97-TR-007 ESC-TR-97-007
Technical Report CMU/SEI-97-TR-007 ESC-TR-97-007 Enterprise Framework for the Disciplined Evolution of Legacy Systems John K. Bergey Linda M. Northrop Dennis B. Smith October 1997 Technical Report CMU/SEI-97-TR-007
Open Source Announcement
Open Source Announcement A software component of this product incorporates source code covered under the GNU Lesser General Public License (LGPL). Acknowledgement: The software included in this product
Design Document Version 0.0
Software Development Templates Design Document Version 0.0 Description of Project DOCUMENT NO: VERSION: CONTACT: EMAIL: Ivan Walsh DATE: 4/13/2004 Distribution is subject to copyright. Design Document
Enterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
Abuse of CPE Devices and Recommended Fixes
Abuse of CPE Devices and Recommended Fixes Dr. Paul Vixie (Farsight Security, Inc.) Chris Hallenbeck (US-CERT, DHS) Jonathan Spring (CERT/CC, Carnegie Mellon) August 7, 2014 Black Hat USA 2014 2014 Carnegie
Open Source Software used in the product
Open Source Software used in the product The software in this product contains parts licensed under various Open Source licenses. Please refer to the below list for further information on the software
DOCUMENT MANAGEMENT SYSTEM WHITE PAPER
DOCUMENT MANAGEMENT SYSTEM WHITE PAPER MARCH 2013. SUMMARY BEXEL Consulting Document Management System serves as a central database for all project-related information, throughout the project lifecycle.
Software Architecture Professional Certificate
Software Architecture Professional Certificate The Software Architecture Professional Certificate program will equip you with state-of-the-art architecture practices and concepts. You will gain experience
How To Protect Your Website From Copyright Infringement
Intellectual Property Protection for Websites By Donika Ilieva, IP and ICT lawyer Nowadays companies cannot afford to ignore the internet, which provides a global market where they can place their products
