Security Software Engineering: Do it the right way
|
|
|
- Vivian Hensley
- 9 years ago
- Views:
Transcription
1 Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, Security Software Engineering: Do it the right way Ahmad AlAzzazi, Asim El Sheikh, Faculty of Information Systems & Technology Faculty of Information Systems & Technology Arab Academy for Banking and Financial Sciences Arab Academy for Banking and Financial Sc. Amman, Jordan Amman, Jordan Abstract: - Secure software development is one of the most information system issues that raised through the use of the internet and networked systems. The importance of developing secure software increases. In this work we present a process for the development of security critical software projects and an overview of some of the existing processes, standards, life cycle models that support the secure software development. It is a guide to the common body of knowledge for producing, acquiring, and sustaining secure software. Key-Words: - Software engineering for Secure Systems, Software Engineering, SSE-CMM, Security Quality Requirements, and Engineering (SQUARE) 1 Introduction With the wide use of the Internet, and increasing need of e-commerce solutions, e-banking, etc., the risks from malicious attacks are increasing. The need not only for physical protection of the software systems, but there is also a need to think about the process of building the software for security critical systems. Software engineering is concerned with the use of engineering principles for developing quality software in a predictable way, engineering is concerned with all aspects of software production that integrates the processes a framework for software development [3]. There are general software engineering processes developed over the past decade. One of the real challenges facing the emerging field of software engineering is security. There is a lack of an easily accessible common body of knowledge in this area. Simply put most software developers and architects, the very people who need to understand and practice software security, remain blithely unaware of their critical role. Due to a report by the Department of Trade and Industry in the UK 60% of organizations have suffered security breaches in the last two years but only 37% of organizations undertake a risk assessment identifying critical assets and 40% of companies that have experienced serious security breaches still do not have any contingency plans to deal with future attacks[11]. Threats from a software security breach could range from the very mild (such as the defeat of copy protection) to the disastrous. US Department of Defense (DoD) found that 88% of their computers were penetrable, and 96 % of those did not notice penetration [11]. Software system designers today must think not only of users, but also of all threats. Security concerns must inform every phase of software development, from requirements engineering to design, implementation, testing, and deployment, which means that security couldn't be handled as a side issue. This paper suggests that techniques must be developed and used to build trust in software tools and processes. This leads to an interaction between software engineering and security engineering, which rise to give to several fascinating research challenges and opportunities. We suggest that security requirements must be incorporated into software systems today. In this paper we argue that security cannot be a side issue of a software project, it is a core of the project, which couldn t function without it. 2 Security Engineering and Software Engineering Devenbau says: Security, like beauty, is in the eye of the beholder [1]. A public library will clearly have a different view of computer security than will a bank transaction. Security is a Non-functional emergent property of a system, like reliability, performance and safety. It could be defined as the system attribute that reflects the ability of the system to protect itself from external attacks that may be accidental or deliberate, the concealment of information or resources, the
2 Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, prevention of unauthorized disclosure of information, the extent that the software itself must be hidden or obscured, the trustworthiness of data or resources [3]. The three Properties of Security are Confidentiality, Integrity and Availability, with other extended Properties like Accountability and Authenticity. A security system consists of hardware, software, people, procedures and culture. There exists many security enforcements like the Network Security, Computer Security, Application Security and Software Security. Secure software is software that cannot be intentionally forced to perform unintended functions; it is the process of designing, building and testing software for security [5]. This gives the interaction between Security Engineering and Software Engineering. Where software engineering is the use of engineering principle to developing quality software in a predictable way, engineering is concerned with all aspects of software production that integrates the processes, Methods and the Tools. For a Software Engineer the following question must be answered: How do we design, build, verify, and maintain software to be secure? This leads to the point that Software security includes software architectures and structures to improve security, techniques and tools that help with reasoning about software security. Software security is concerned with algorithm design, traditional cryptography, education, design, interface selection, specification, Implementation and coding, verification, testing and evaluation, deployment and secure execution, maintenance and bug fixing, and refinement. This means that building secure software is a process that ends with an artifact; and software security is concerned with all phases of a software engineering process. We could argue that current development practice suffers from different key problems like, Security requirements tend to be kept separate from other system requirements, and not integrated into any overall strategy [6]. The overwhelming majority of existing software, even software for safety-critical, security-critical systems, has been built and is being built in an ad hoc, unsystematic fashion. In our work, we built a frame work that defines the security activities that have to be done in all the phases of the software engineering process from the specification of the requirements to the deployment with a deep look in each phase for the security activities that have to be done. 3 Major Components of Security Engineering Before looking into security activities in each phase of our security process (next section), we have a short look at the major components of security engineering, which are almost unknown for a software engineer. They are important to determine the software s Security needs. First, one has to define the security goals based on actual needs, and only then review the entire system and security policies with the goals in mind. Steps for making a secure system are [2]: 1- Security Assessment 2- Security Design 3- Security Implementation 4- Security Monitoring 3.1 Security Assessment Conducting Security Assessment provides detailed recommendations for identifying, correcting and preventing security problems. The following issues are involved: Asset Identification, Threat Assessment, Laws, Regulation and Policies, Personnel, Reporting and Follow-up, Tools, and Training Certification. 3.2 Security Design The Security Components are divided into two main categories, the physical and logical parts. Physical Security includes elements like Buildings, Devices (e. g. Network Devices, Equipment, Cables, Communication devices, Servers, Routing Equipment and other Hardware devices), and Human (internal and external). On the other hand, the logical Security includes the Application Security, Operational Security, systems, Acceptable Use Policy (AUP), Intrusion detection /prevention /recovery, use procedures, authentication, identification, privacy, integrity, non-repudiation, encryption Backups, Risks, Assessment, access control list (ACL), Access Cards, Virtual Private Network (VPN) and Biometric Authentication. 3.3 Security Implementation For all of these components, there are a lot of policies from a Security engineering perspective that have to be considered.
3 Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, Security Monitoring There is much more to security analysis than code review. There are some Methods for performing that, like architectural security analysis, attach trees, source code auditing and others [10]. of public web pages. B) Threat analysis and risk assessment, the possible security threats are identified and the risks associated with each of these 4 Software Engineering for Security The vast majority of software developers continue to focus on code. Software security is fundamentally a software engineering problem, encompassing producing and evaluating secure software. Developing secure software needs support from all aspects of software processes, methods, and tools. A majority of security incidents result from defects in software requirements, design, or code. Specification errors can be easier and cheaper to fix in the early stages using analysis tools. How is Security Viewed in Software Engineering? It is a Non-functional requirement, an Emergent property, an Aspect of dependability, to use security mechanisms for the implementation of the security policies. We must engineer security into software as an up front requirement rather than a last minute thought to recognize that exploits/vulnerabilities are results of flawed design or implementation. The overwhelming majority of existing software, even software for security-critical systems, has been built and is being built in an ad hoc, unsystematic fashion. We have to consider carefully the security aspects of the software product from the beginning with requirements and moving on through later lifecycle activities, ending with deployment and administration of the software product. 4.1 Requirements for a secured system The requirements of a specific security system can only be determined after detailed consideration of the business context, user preferences, and the defense posture of the software system. A security requirement is a manifestation of highlevel policies into the detailed requirements of a specific software system. The security specification process which leads to the early stage of the software process lifecycle is shown in figure 1 [3]. The following are the Stages of security specification: A) Asset identification and evaluation; which assets (data and programs) and their required degree of protection are identified. The degree of required protection depends on the asset value so that a password file (say) is more valuable than a set Figure 1: specification process of security threats is estimated. C) Threat assignment; the identified threats are related to the assets so that, for each identified asset, there is a list of associated threats. D) Technology analysis; the available security technologies and their applicability against the identified threats are assessed. E) Security requirements specification; the security requirements are specified. Where appropriate, these will explicitly identify the security technologies that may be used to protect against different threats to the system. They include the following types of security requirements: Identification requirements, Authentication requirements, Authorization requirements, Immunity Requirements, Integrity Requirements, Intrusion detection requirements, Non-repudiation requirements, Privacy requirements, Security auditing requirements, and system maintenance security requirements. 4.2 Modeling for a Secured System The second design phase focuses on clarifying the model of the system and the security requirements. Dependencies between the assets of the system must also be identified based on the information gathered in the security requirements phase to select or design the appropriate analysis and security design. For the security analysis and security design part of the process, it is important to ensure that expert knowledge is available in order to identify threats and countermeasures. Designers of secure software systems can have a number of distinctive goals including: design to defend after initial security
4 Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, violation(s), architecturally eliminate possibilities for violations. Some of the architectural styles or style elements could include: Reference monitors, Multiple Independent Levels of Security (MILS), Multiple Single Levels of Security (MSLS), Distributed access control, Tolerant to (partial) attacker success including self healing approaches, Adaptive distributed reconfiguration responses to attacks, Compartmentalization via Virtual machines, Separation via encryption, Physical separation, Separation except at point of use Filters, guardians, and firewalls. 4.3 Construction for a Secured System Secure software construction creates working, meaningful, secure software through design, coding, verification, unit testing, integration testing, and debugging [5]. Some vulnerabilities in software systems occur with such great frequency they have been deemed common vulnerabilities. To effectively avoid vulnerabilities, one must fully understand the types of weaknesses that enable them. We have to use Security Principles in Secure Coding like Input Validation, Preventing Buffer Overflow, Anti-Tamper Technologies, and the use Secure Coding Standards, etc. engineering practices against the principles. The SSE-CMM, by defining such a framework, provides a way to measure and improve performance in the application of security engineering principles. The SSE-CMM also describes the essential characteristics of an organization s security engineering process. The model is organized into two broad areas: Security Engineering, and Project and Organizational processes. Security Engineering in turn is organized into Engineering Processes, Assurance Processes, and Risk Processes. There are 22 Process Areas distributed among the three categories. Each Process Area is composed of a related set of process goals and activities [7]. The International Systems Security Engineering Association (ISSEA) maintains the SSE-CMM (Figure 2). Our Research Model should describe the detailed security activities that have to be done in each phase of the development of the security critical software product. In the following two sections of this paper, we show two different approaches dealing with security critical software development. 5 Systems Security Engineering Capability Maturity Model (SSE- CMM) In comparison to our work, we show the SSE-CMM, which is a process model that can be used to improve and assess the security engineering capability of an organization [7]. The SSE-CMM provides a comprehensive framework for evaluating security engineering practices against the generally accepted security engineering principles. By defining such a framework, the SSE-CMM, provides a way to measure and improve performance in the application of security engineering principles. The SSE-CMM has been adopted as the ISO/IEC 218. The stated purpose for developing the model is that, although the field of security engineering has several generally accepted principles, it lacks a comprehensive framework for evaluating security Figure 2: The SSE-CMM
5 Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, The SEE-CMM is a straightforward analysis of the existing processes to determine which base process have met and the maturity levels they have achieved, which is not simple and may involve interactions with engineers who actually use the process. 6 Security Quality Requirements Engineering (SQUARE) Methodology Another comparable methodology to our work is the Security Quality Requirements Engineering (SQUARE) Methodology for eliciting and prioritizing security requirements in software development projects, which was developed by the Software Engineering Institute s Networked Systems Survivability (NSS) Program [8]. The methodology s steps are explained, and results from its application in recent case studies are examined. The Methodology consists of 9 steps to elicitate the requirements (step 1: Agree on Definitions, Step 2: Identify Security Goals, Step 3: Develop Artifacts, Step 4: Perform Risk Assessment, Step 5: Select Elicitation Technique, Step 6: Elicit Security Requirements, Step 7: Categorize Requirements, Step 8: Prioritize Requirements, Step 9: Requirements Inspection). Each step is evaluated using Inputs, the used Techniques, the Participants and the Outputs of the step. The SQUARE) Methodology concentrates on the requirement phase in software development, which is only a part of the overall process. 7 Conclusion The Development of secured software gives us the interaction between two disciplines, software engineering and security engineering. At a software engineering process we have to consider the security aspects in all of the phases of the Software development process from specification of the requirements until construction. This consideration of all of the security aspects should not be an ad hoc solution to the software problem (as in most cases). Some standards exits in the area of the development of secured systems, but many research areas still need to be discussed. The need for more secured systems urges us to look deeper into software engineering processes to build better frameworks for them. That means, there is growing need to incorporate security engineering into standard analysis and design processes and security requirements must not be left to be dealt with as a side-issue, or an afterthought. Some existing methodologies are looking either on existing process like the SEE-CMM or concentrating only on some parts of the software engineering process like the (SQUARE) Methodology. In our work, a framework for all of the software engineering activities should be built with a deep consideration of the security activities in each phase. References: [1] Devanbu, T & Stubblebine, S., Software Engineering for Security: A Roadmap, Proceedings of the 22nd International Conference on Software Engineering, 2000,Pages: [2] Estublier, J. Software configuration management: a roadmap, Proceedings of the 22nd International Conference on Software Engineering, 2000, Pages: [3] Sommerville, I., Software Engineering, 6th Edition, Prentice-Hall, [4] Redwine, S., Secure Software Assurance, US Departments of Homeland Security and Defense, , accessed 10/09/2006. [5] Abrams, M. D., Security Engineering in an Evolutionary Acquisition Environment. New Security Paradigms Workshop, Proceedings of the 1998 workshop on New security paradigms, Virginia, United States, 1998, Pages: [6] Flechais, I, Angela, M., Sasse, S. & Hailes, M., Bringing Security Home:A process for developing secure and usable systems, Proceedings of the 2003 workshop on New security paradigms, Ascona, Switzerland, 2003, Pages: [7] Software Engineering Institute at Carnegie Mellon (SEI), Technical Program Report, , accessed 21/07/2006. [8] Mead, N., Hough, E. & Stehney, T., SEI,TECHNICAL REPORT CMU/SEI TR-009, ,accessed 12/08/ [9] Jurjens, J., Secure Systems Development with UML, Springer Verlag-Berlin, [10] Viega, J. & McGraw, G, How to avoid Security Problems the right way, Addisonwesley, [11] Information Security Breaches Survey, Technical Report, Department of Trade and Industry, , accessed 05/12/2006
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
A Survey on Requirements and Design Methods for Secure Software Development*
A Survey on Requirements and Design Methods for Secure Software Development* Muhammad Umair Ahmed Khan and Mohammad Zulkernine School of Computing Queen s University Kingston, Ontario, Canada K7L 3N6 {umair
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview
Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
A Security Approach in System Development Life Cycle
A Security Approach in System Development Life Cycle (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. [email protected] (2) Dr.K.Alagarsamy,
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Secure Software Development Models/Methods. Associate Professor
IS 2620: Developing Secure Systems Secure Software Development Models/Methods Lecture 1 Aug 27, 2014 James Joshi, Associate Professor Objective Understand/Familiarize with various process models for secure
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected].
Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected] This tutorial
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Put into test the security of an environment and qualify its resistance to a certain level of attack.
Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
