Software Security and Security Software
نویسنده
چکیده
mation security models or the fundamental building blocks used to create them. (A good example of this is “When Hashes Collide,” the first installment of the magazine’s newest department, Crypto Corner. Yet, we rarely read about security technology’s strengths and weaknesses in the specific hardware and software products used in real-world environments. Isn’t it curious that almost no published security product review or comparison explicitly assesses or provides any more than superficial details about products’ security? How could this be— especially considering that so many current technologies are deeply rooted in cryptography, a field that derives its evolution from an iterative attack-and-defend, prove-and-refute process and whose practitioners accept and embrace the idea of breaking and reinventing the very systems, algorithms, and tools that result from long hours of hard work? We can assume that cryptographers apply logic that’s not only fundamental to modern scientific development but that’s also been used for decades or, arguably, centuries. If that’s true, we could justify the lack of scientific rigor in security products by noting the information security industry’s immaturity or by including in the analysis other variables that drive its evolution. For such an analysis, we should at least consider the economic, cultural, political, and ideological backgrounds, as well as goals and motivations, of the organizations and individuals that shape the information security microcosm. Bearing in mind that humans drive the discipline’s evolution, and adding the weight of the author’s own subjectivity to the analysis, you’ll find this Attack Trends installment looks at the security vendor space—of which I am part—in search of new vulnerability types and attack trends.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملThe effect of developing the dynamics of library software system on information security management (Case study: Libraries of Islamic Azad universities of the country)
Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005