A Methodology for Capturing Software Systems Security Requirements
|
|
|
- Marilyn Hoover
- 9 years ago
- Views:
Transcription
1 A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas
2 Outline Introduction to security Software Security Security Definitions Security Requirement Engineering Problem Statement Survey approaches for eliciting security requirements Thesis Objective and Approach
3 Software Security Why secure software? Attacker hacks software systems Vulnerabilities exploited Cost of attack
4 Secure Software Development Developing secure software systems An example for secure software development lifecycle [1]
5 Security Definitions Assets Threats Security Concerns Confidentiality Integrity Availability Security goals Vulnerability Countermeasures
6 Security Definitions Security Threats, Requirements, and Mechanisms relations [2]
7 Security requirements Definition: How can we achieve security What need to be secured What must not occur to achieve security
8 Security Requirement Engineering Consider security early Update requirement phase to support security Perform Security Requirements Engineering Elicit, Analyze, and Validate
9 Problem Statement Elicit adequate security requirements Assist non-security experts
10 Threat Modeling Threat Modeling for Eliciting Security Requirements [3]
11 Threat Modeling Attack Trees Attack tree [5]
12 Threat Modeling (Threats Classification STRIDE [6]) Spoofing Tampering Repudiation Information disclosure Denial of service Elevation of privilege access is gained to inaccessible assets using someone else s credentials. Occurs when data is changed when an attack is performed. a user denies performing an action, but the system has no way to prove an action on a user although the user has performed it. information is disclosed to a user not permitted to see it. a valid users become unable to access resources. a privileged status is gained by an unprivileged user.
13 Threat Modeling (Threats Ranking DREAD [6]) Damage Potential The cost of the damage when the threat is exploited. Reproducibility The rate of reproducing the exploited threat Exploitability The level of skill needed to exploit this threat Affected Users The number of affected users Discoverability The easiness of discovering this threat
14 Threat Modeling Steps for eliciting Security Requirements 1. System characterization 2. Assets and access points identification 3. Threats identification (STRIDE) - Threat Catalogs 4. Threats Analysis (DREAD) 5. Elicit Security Requirement by negating threats
15 Threat Modeling Expressing security requirements as negative statements is inadequate Negative statements should be converted to positive statements
16 Misuse Cases Example misuse case [7]
17 Misuse Cases (Security Use Cases) Misuse case with Security Use case [2]
18 Misuse cases (Using generic templates)
19 Misuse cases (Using generic templates)
20 Misuse cases Advantages: Lightweight approach Model interaction between threats and system Disadvantages: Informal causing ambiguity
21 Goal Oriented Requirement Engineering (KAOS) KAOS Approach [13]
22 Goal Oriented Requirement Engineering (KAOS) Goal Graph KAOS Goal Graph [13]
23 Secure Goal Oriented Requirement Anti-Models Engineering (KAOS) Anti-model Graph [4]
24 Secure Goal Oriented Requirement Engineering (KAOS) Construct high-level security goals Example: Avoid[SensitiveInfoKnownByUnauthorizedAgent] Build anti-models to elaborate vulnerabilities Derive countermeasures and security requirements Avoid[vulnerability]
25 Secure Goal Oriented Requirement Attack pattern Engineering (KAOS) DOS Attack pattern [14]
26 Secure Goal Oriented Requirement Engineering (KAOS) Derivation of precise security requirements from high-level goals Formal methodology enabling automatic processing
27 Secure Agent orient based approaches (i*) Dependency Diagram:
28 Secure Agent orient based approaches (i*) Attacker Analysis: who is likely to attack the system? By what means might a specific attacker attack the system? Dependency vulnerability analysis: Which dependency relationships are vulnerable to attack?, What are the chain effects if one dependency link is compromised? Countermeasure Analysis: how to protect the system the attackers exploiting the vulnerabilities
29 Secure Agent orient based approaches (i*) Adapting security to i* [8]
30 Secure Agent orient based Advantages: approaches Considering the human factor which has a significant impact on security. For example, threats may involve tricking other people (doctors or nurses in the case of medical records) to break security goals Disadvantage: Concentrates on confidentiality concerns
31 Requirement Engineering Using Problem Frames Generalized Problem Diagram [9]
32 Problem Frames (Problem Decomposition) Problem decomposition into subproblems [10] Problem Context Problem Diagram for Employee Display Information subproblem
33 Abuse Frames Generic Abuse Frame [12] Model and analyze threats Bound scope of security problems What attack harms what asset in what subproblem
34 Abuse Frames Abuse Frame for Regime editing subproblem [12] c: The editing commands that are entered by the Operator. d: The edit operations performed by the Regime Editor. e: The effects of the edits on the Light Regime
35 Security Requirement Engineering based on Problem Frames 1- Model system using Problem Frames 2- Identifying assets and threat descriptions. What harm could come from violating the [insert security concerns] of [insert asset]? 3- Identify high-level security goals that avoids threats Example, Provide data to authorized users
36 Security Requirement Engineering based on Problem Frames 4- Constrain Functional requirements to avoid threats Problem Frame Diagram for constrained functional requirement [11]
37 Security Requirement Engineering based on Problem Frames 5- Validate security requirements using security arguments Trust assumptions (domain behavior premises) - (security requirements) A - B means B can be proved from A.
38 Security Requirement Engineering based on Problem Frames Advantages: Specifies security requirements precisely by constraining functional requirements Integrate system behavior with threats using problem frames
39 Security Problem Frames: Generic patterns for security problems [15]
40 Thesis Objective Develop a methodology for eliciting security requirement that adapts problem frames, abuse frames and security problem frames to achieve the two main objectives : (1) Eliciting adequate security requirements (2) Assisting security inexperienced analysts to elicit security requirements
41 cd Approach steps Proposed Methodology Model the system context and functional requirements Identify the system assets Identify threats using abuse frames Crosscut threats with Assets to identify vulnerabilities [No Vulnerability] [Found Vulnerability] Search Security Problem Frames (SPF) Catalog [If no results] [If found SPF] Constrain Functional Requirements To Obtain Security requirements Instantiate Security Problem Frame
42 Methodology Advantages Utilizes different methodologies based on problem frames that complement each other Assist the analyst during security requirement elicitation
43 Contribution Interfacing between the Security Problem Frames, Abuse Frames and Problem Frames Provide a tool that helps in choosing and instantiating the patterns in the Security problem frame catalog
44 References [1] A. Apvrille and M. Pourzandi, "Secure Software Development by Example," IEEE Security &Privacy, vol. 3, no. 4, pp , 2005 [2] D. Firesmith. Security Use Cases. Journal of Object Technology, Vol. 2, No. 3, 53-64, 2003 [3] Suvda Myagmar, Adam J. Lee, and William Yurcik, Threat Modeling as a Basis for SecurityRequirements, IEEE Symposium on Requirements Engineering for Information Security (SREIS 05), 2005
45 References [4] A. van Lamsweerde, Elaborating Security Requirements by Construction of Intentional Antimodels, Proc. 26th Int l Conf. Software Eng. (ICSE 04), IEEE CS Press, 2004 [5] Bruce Schneier, Attack Trees, Dr. Dobb's Journal December 1999 [6] F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, 2004
46 References [7] S. Ardi, David Byres,P. H. Meland,I.A. Tondel, N.Shahmehri How Can the Developer Benefit From Security Modeling, In Second International Conference on Availability, Reliability and Security(ARES 07), IEEE, 2007 [8] L. Liu, E. Yu, and J. Mylopoulos. Security and privacy requirements analysis within a social setting. In Proc. of RE 03, pages , 2003 [9] M. Jackson. Problem Frames, Problem Frames and Software Engineering, Expert Systems, Volume 25, Number 1, pp. 7-8(2), February 2008 M. Jackson. Problem Frames, Problem Frames and Software Engineering, Expert Systems, Volume 25, Number 1, pp. 7-8(2), February 2008
47 References [10] C.B. Haley, R. Laney, and B. Nuseibeh Deriving Security Requirements From Crosscutting Threat Descriptions, in Proceedings of the Third International Conference on Aspect-Oriented Software Development, Lancaster, UK, March 22 26, 2004 [11] C.B. Haley, J.D. Moffett, R. Laney, and B. Nuseibeh, A Framework for Security Requirements Engineering, Proc Software Eng. for Secure Systems Workshop with the 28th Int l Conf. Software Eng., 2006 [12] D. Hatebur, M. Heisel, and H. Schmidt, A pattern system for security requirements engineering, in Proceedings of the International Conference on Availability, Reliability and Security (AReS), pp , IEEE, 2007
48 References [12] Lin, L., Nuseibeh, B., Ince, D., Jackson, M., & Moffett, J. "Introducing Abuse Frames for Analyzing Security Requirements," In Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03). Monterey CA USA, pp , Sep 2003 [13] A. van Lamsweerde and E. Letier, Handling Obstacles in Goal-Oriented Requirements Engineering, IEEE Transactions on Software Engineering, Special Issue on Exception Handling, 2000 [14] Laurent A. Hermoye and Axel van Lamsweerde, and Dewayne E. Perry. "A Reuse-Based Approach to Security Requirements Engineering", September 2006
49 References [15] D. Hatebur, M. Heisel, and H. Schmidt, A pattern system for security requirements engineering, in Proceedings of the International Conference on Availability, Reliability and Security (AReS), pp , IEEE, 2007
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
Threat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
Towards Security Risk-oriented Misuse Cases
Towards Security Risk-oriented Misuse Cases Inam Soomro and Naved Ahmed Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia {inam, naved}@ut.ee Abstract. Security has turn
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Suraksha: A Security Designers Workbench
Suraksha: A Security Designers Workbench Santhosh Babu G., Vineet Kumar Maurya, Ebenezer Jangam, Muni Sekhar V., Asoke K. Talukder, Alwyn Roshan Pais Information Security Lab Dept. of Computer Engineering,
Secure Software Design in Practice ARES SECSE Workshop
Secure Software Design in Practice ARES SECSE Workshop Per Håkon Meland and Jostein Jensen SINTEF Information and Communication Technology Department of Security, Safety and System Development {Per.H.Meland,
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
Core Security Requirements Artefacts
ISSN 1744-1986 Technical Report N o 2004/23 Core Security Requirements Artefacts Jonathan D. Moffett, Charles B. Haley, Bashar Nuseibeh 21 st June 2004 Department of Computing Faculty of Mathematics and
Security Threats in Demo Steinkjer
Security Threats in Demo Steinkjer Report from the Telenor-SINTEF collaboration project on Smart Grids Author(s) Inger Anne Tøndel, SINTEF Martin Gilje Jaatun, SINTEF Maria Bartnes Line, SINTEF/NTNU SINTEF
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations Golnaz Elahi 1, Eric Yu 2, and Nicola Zannone 3 1 Department of Computer Science, University of Toronto
Defending Against Attacks by Modeling Threat Behaviors
Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
An Approach to Threat Modeling in Web Application Security Analysis
Volume-5, Issue EICA2012-5, February 10, 2012 An Approach to Threat Modeling in Web Application Security Analysis Sreenivasa Rao B Dept. of Computer Science & Engineering CMJ University, Shillong, India
Threat scenario based security risk analysis using use case modeling in information systems
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 5:293 300 Published online 7 April 2011 in Wiley Online Library (wileyonlinelibrary.com)..321 SPECIAL ISSUE PAPER Threat scenario based
To Comply Software and IT System Development with Related Laws Abstract. Keywords: 1. PROBLEM STATEMENT
To Comply Software and IT System Development with Related Laws Fatemeh Zarrabi Supervising team: Haris Mouratidis, David Preston, Shareeful Islam School of Computing, Information Technology and Engineering,
Abstract. Keywords: requirements engineering; threats; security; ATM; analysis; reuse
Threat Analysis in Goal-Oriented Security Requirements Modelling Per Håkon Meland, SINTEF ICT, Norway * Elda Paja, University of Trento, Italy Erlend Andreas Gjære, SINTEF ICT, Norway Stéphane Paul, Thales,
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
Threat Analysis for Hardware and Software Products using HazOp
Threat Analysis for Hardware and Software Products using HazOp Burzin Daruwala, Salvador Mandujano, Narasimha Kumar Mangipudi, Hao-chi Wong Security Center of Excellence Intel Corporation 2111 NE 25 th
A Governance Framework for Building Secure IT Systems *
A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue
Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Milene Serrano 1 and Maurício Serrano 1 1 Universidade de Brasília (UnB/FGA), Curso de Engenharia de Software,
Goal-Based Self-Contextualization
Goal-Based Self-Contextualization Raian Ali, Fabiano Dalpiaz Paolo Giorgini University of Trento - DISI, 38100, Povo, Trento, Italy {raian.ali, fabiano.dalpiaz, paolo.giorgini}@disi.unitn.it Abstract.
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Design of a Modelling Language for Information System Security Risk Management
1 Design of a Modelling Language for Information System Security Risk Management Nicolas Mayer, Patrick Heymans, Member, IEEE and Raimundas Matulevičius Abstract Nowadays, security has become one of the
A Survey on Requirements and Design Methods for Secure Software Development*
A Survey on Requirements and Design Methods for Secure Software Development* Muhammad Umair Ahmed Khan and Mohammad Zulkernine School of Computing Queen s University Kingston, Ontario, Canada K7L 3N6 {umair
THREAT MODELLING FOR ACTIVE DIRECTORY
THREAT MODELLING FOR ACTIVE DIRECTORY David Chadwick ISI, University of Salford, Salford, M5 4WT, England. Abstract: Key words: This paper analyses the security threats that can arise against an Active
Threat Modeling Smart Metering Gateways
Threat Modeling Smart Metering Gateways Armin Lunkeit OpenLimit SignCubes GmbH Berlin, Germany [email protected] Tobias Voß Sankt Augustin, Germany [email protected] Hartmut Pohl Sankt
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities Golnaz Elahi University of Toronto [email protected]
Misuse Cases: earlier and smarter information security
Misuse Cases: earlier and smarter information security By defining the scenarios in which computer systems could be misused, security professionals can test more thoroughly and close down risk more quickly.
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
CSE 5392 Sensor Network Security
About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu [email protected] Tel: (817) 272-0741 Office: 330NH
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
Threat Modeling Architecting & Designing with Security in Mind OWASP. The OWASP Foundation http://www.owasp.org. Venkatesh Jagannathan
Threat Modeling Architecting & Designing with Security in Mind Venkatesh Jagannathan -Chennai Chapter Leader [email protected] [email protected] Copyright The Foundation Permission is granted to copy, distribute
How To Secure An Open Source System From Attack
Open-Source Security Assessment More organisations are using open source software, but what are the risks involved? Yoav Aner and Carlos Cid present a framework for security evaluation and assessment of
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Functional vs. Load Testing
Best Practices in Performance & Security Testing March 26, 2009 CVN www.sonata-software.com Functional vs. Load Testing Functional test Objective Functionality Example Do business processes function properly
Threat Modelling (Web)Apps Myths and Best Practices OWASP 7.11.2012. The OWASP Foundation http://www.owasp.org. Matthias Rohr
Threat Modelling (Web)Apps Myths and Best Practices Matthias Rohr 7.11.2012 www.matthiasrohr.de [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider Golnaz Elahi Department of Computer Science University of Toronto Canada, M5S 1A4 Email: [email protected] Zeev
feature requirements engineering
feature requirements engineering Exploring Alternatives during Requirements Analysis John Mylopoulos, University of Toronto Goal-oriented requirements analysis techniques provide ways to refine organizational
Attack Net Penetration Testing
Attack Net Penetration Testing J.P. McDermott Department of Computer Science James Madison University Harrisonburg, Virginia 22807 [email protected] Abstract The modeling of penetration testing as a
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
A Practical Approach to Threat Modeling
A Practical Approach to Threat Modeling Tom Olzak March 2006 Today s security management efforts are based on risk management principles. In other words, security resources are applied to vulnerabilities
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Threat Modeling: Lessons from Star Wars. Adam Shostack @adamshostack
Threat Modeling: Lessons from Star Wars Adam Shostack @adamshostack Agenda What is threat modeling? A simple approach to threat modeling Top 10 lessons Learning more What is threat modeling? A SIMPLE APPROACH
