Prioritization Based Taxonomy of DevOps Security Challenges Using PROMETHEE
نویسندگان
چکیده
منابع مشابه
SLA-Based Continuous Security Assurance in Multi-Cloud DevOps
Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...
متن کاملTest Prioritization of Risk-based Security Tests
Many approaches are developed for e cient identi cation and estimation of security risks. One big challenge is to prioritize the related test cases of identi ed risks. The e ort and costs of security testing can be high and the budget is limited. The challenge is to get a proper proportion between test e ort and potential system harm. Based on the results of security testing countermeasures can...
متن کاملTowards adaptive event prioritization for network security - ideas and challenges
In the network security domain Intrusion detection systems (IDS) are known for their problems in creating huge amounts of data and especially false positives. Several approaches, originating in the machine learning domain, have been proposed for a better classification. However, threat prioritization has also shown, that a distinction in true and false positives is not always sufficient for a p...
متن کاملUsing Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user education programs have been created by security professionals who do not necessarily have an educational background. This paper show how the use of learning taxonomies, specifically Bloom’s taxonomy, can improve such educati...
متن کاملAn Evaluation of Cost-Benefit Using Security Requirements Prioritization
This article describes a comparison of six security requirements prioritization methods: analytical hierarchy process (AHP), accelerated requirements method (ARM) prioritization, priority poker, cost-benefit model, security investment decision dashboard (SIDD), and COCOMO-II security extensions. OVERVIEW When building complex systems, stakeholders must often prioritize requirements as part of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2998819