CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10

Engineering Security Into the Software Development Life Cycle, by Gary M. McGraw and Nancy R. Mead -- The Build Security In Software Assurance Initiative promotes less vulnerable software with security built in from the start. Creating a Software Assurance Body of Knowledge, by Samuel T. Redwine Jr....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: McGraw, Gary M, Mead, Nancy R, Redwine, Jr , Samuel T, Henning, Ronda R, Ibrahim, Linda, Hofmeyr, Steven, Harrison, W S, Hanebutte, Nadine, Oman, Paul W, Alves-Foss, Jim, Main, Alec
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Engineering Security Into the Software Development Life Cycle, by Gary M. McGraw and Nancy R. Mead -- The Build Security In Software Assurance Initiative promotes less vulnerable software with security built in from the start. Creating a Software Assurance Body of Knowledge, by Samuel T. Redwine Jr. -- This article presents an initiative to assemble the knowledge to acquire, develop, and sustain secure software with functionality. Designing for Disaster: Building Survivable Information Systems, by Ronda R. Henning -- Designing survivability measures into an information system from the start allows continued operations through failure scenarios. Sixteen Standards-Based Practices for Safety and Security, by Dr. Linda Ibrahim -- The 16 practices presented in this article help establish a safety and security capability, identify and manage risks, and assure product safety and security throughout the life cycle. The Information Technology Security Arms Race, by Dr. Steven Hofmeyr -- This author discusses how an intrusion prevention system can fill the need for new technology defenses to protect against new information attack technologies. The MILS Architecture for a Secure Global Information Grid, by Dr. W. Scott Harrison, Dr. Nadine Hanebutte, Dr. Paul W. Oman, and Dr. Jim Alves-Foss -- With the Multiple Independent Levels of Security safety architecture, guards act to filter and enforce information flow, allowing large systems to have partitions small enough to verify. Application Security: Protecting the Soft Chewy Center, by Alec Main -- Application security is rising up to protect from the inside out by implementing defensive techniques into top-level applications and data.