Software Failures, Security, and Cyberattacks
نویسندگان
چکیده
منابع مشابه
Software Security and Security Software
mation security models or the fundamental building blocks used to create them. (A good example of this is “When Hashes Collide,” the first installment of the magazine’s newest department, Crypto Corner. Yet, we rarely read about security technology’s strengths and weaknesses in the specific hardware and software products used in real-world environments. Isn’t it curious that almost no published...
متن کاملSoftware Failures and Chaos Theory
Software itself is very complex and studying its failure is much more complex. Complexity is a relative concept and defining complexity in software failure is chaotic in nature. Software failure of complex systems and understanding the complex system needs some sort of theoretical support for analyzing the nonlinearity in the system. Complex systems have attributes like subsystems, composed of ...
متن کاملSecurity Requirements for Tolerating Security Failures
This paper describes security failure-tolerant requirements, which tolerate the failures of security services that protect applications from security attacks. A security service, such as authentication, confidentiality or integrity security service, can be always broken down as advanced attack skills are coined. There is no security service that is forever secure. This paper describes an approa...
متن کاملToward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security realm. We analyzed non-security and security failure data reported for the year 2007 of a Cisco software system. We used non-security failure reports as input variables into a classification and regression tree (CART) mo...
متن کاملProtecting Civil Aviation from Cyberattacks
Cybersecurity is a growing concern for civil aviation, although the significance of reports in May that a computer security researcher hacked into aircraft control systems while flying as a passenger aboard commercial jets is still unclear. The probe into the alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administrat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis
سال: 2011
ISSN: 2199-9201,1619-7623
DOI: 10.14512/tatup.20.3.41