Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

نویسندگان

  • Laurie A. Williams
  • Michael Gegick
  • Andrew Meneely
چکیده

Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of a vulnerability, or knowing the best mitigation strategy. We propose the Protection Poker activity as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants. An excellent outcome of Protection Poker is that security knowledge passed around the team. Students in an advanced undergraduate software engineering course at North Carolina State University participated in a Protection Poker session conducted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to a more effective software security learning experience than in prior semesters. A pilot of the use of Protection Poker with an industrial partner will begin in October 2008.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Can Scaffolding Mechanisms of Structuring and Problematizing Facilitate the Transfer of Genre-based Knowledge to Another Discourse Mode?

A pivotal issue in research on writing concerns whether the knowledge of how genres are constructed and learned in one discipline/genre can be transferred to other contexts, genres, and disciplines. Yet, studies conducted so far have not presented a unified and complete view of how various writing instructional techniques can result in transferability. This study examined the effect of structur...

متن کامل

Studing the relationship between intrinsic motivation and extrinsic motivation on employee knowledge transfer (case study of Social Security organization in Kerman)

Knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. The aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in Kerman. The method research is descriptive and...

متن کامل

The Spiral_OWL Model – Towards Spiral Knowledge Engineering

The Spiral development model has been used successfully in many commercial systems and in a good number of defense systems. This is due to the fact that cost-effective incremental commitment of funds, via an analogy of the spiral model to stud poker and also can be used to develop hardware or integrate software, hardware, and systems. To support adaptive, semantic collaboration between domain e...

متن کامل

ارائه یک روش نرم افزاری جهت استفاده از ارزیابی ریسک در بهینه سازی اقدامات حفاظت حریق ساختمان

  Background and aims: The property loss and physical injuries due to fire events in buildings demonstrate the necessity of implementation of efficient and performance based fire safety measures. Effective and high efficiency protection is possible when design and selection of protection measures are based on risk assessment. This study aims at presenting a software method to make possible sele...

متن کامل

Critical Infrastructure Protection and the Evaluation Process

Critical Infrastructure Protection importance is seen as basic element of maintaining vital societal functions from social and economic perspective. In relation to the needs of optimal and relevant protection and security measures selection is necessary to establish framework for Critical Infrastructure protection evaluation in relation and interconnection to risk assessment. This article discu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009