Prioritization Based Taxonomy of DevOps Security Challenges Using PROMETHEE

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps

Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...

متن کامل

Test Prioritization of Risk-based Security Tests

Many approaches are developed for e cient identi cation and estimation of security risks. One big challenge is to prioritize the related test cases of identi ed risks. The e ort and costs of security testing can be high and the budget is limited. The challenge is to get a proper proportion between test e ort and potential system harm. Based on the results of security testing countermeasures can...

متن کامل

Towards adaptive event prioritization for network security - ideas and challenges

In the network security domain Intrusion detection systems (IDS) are known for their problems in creating huge amounts of data and especially false positives. Several approaches, originating in the machine learning domain, have been proposed for a better classification. However, threat prioritization has also shown, that a distinction in true and false positives is not always sufficient for a p...

متن کامل

Using Bloom's Taxonomy for Information Security Education

The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user education programs have been created by security professionals who do not necessarily have an educational background. This paper show how the use of learning taxonomies, specifically Bloom’s taxonomy, can improve such educati...

متن کامل

An Evaluation of Cost-Benefit Using Security Requirements Prioritization

This article describes a comparison of six security requirements prioritization methods: analytical hierarchy process (AHP), accelerated requirements method (ARM) prioritization, priority poker, cost-benefit model, security investment decision dashboard (SIDD), and COCOMO-II security extensions. OVERVIEW When building complex systems, stakeholders must often prioritize requirements as part of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2998819