COMMENTS

  1. Case Study

    Overview The purpose of the case study project is to get you acquainted with the security challenges of a real, complex, messy software product. In class, you learn about security ideals, common mistakes, and best practices. In the case study, you will see how those ideals are applied (or not applied!) to actual problems. This case study is designed to help you in two key ways: investigation ...

  2. Exploring Security Procedures in Secure Software Engineering: A

    Selected studies led us to discover 55 Secure Software Engineering (SSE) metrics, 68 SSE tools, 33 SSE standards, and 12 SSE research topics that have been discussed and addressed. ... "Using mapping studies as the basis for further research - A participant-observer case study," Information and Software Technology, vol. 53, pp. 638-651 ...

  3. The State of the Art on Secure Software Engineering:

    A Systematic Mapping Study (SMS) has been conducted in this paper to examine the existence of software security frameworks, models and methods. In total, we selected 116 primary studies. After examining the selected studies, we identified 37 Secure Software Engineering (SSE) paradigms/frameworks/models.

  4. Secure software development and testing: A model-based methodology

    A model-based secure development methodology: from design to testing. As anticipated, this paper presents a secure development methodology meant to support developers from the early security analysis stages to post-development security testing. The methodology, whose steps are sketched in Fig. 4, leverages automated and semi-automated processes ...

  5. Security Monitoring during Software Development: An Industrial Case Study

    The devastating consequences of successful security breaches that have been observed recently have forced more and more software development enterprises to shift their focus towards building software products that are highly secure (i.e., vulnerability-free) from the ground up. In order to produce secure software applications, appropriate mechanisms are required for enabling project managers ...

  6. PDF Managing Security Requirements in Practice: A Case Study

    privacy, security in software systems has become an increasingly important topic and led to increased software engineering research [1,4,5,6]. In our empirical research on the topic of how to go from requirements to architecture [2,3], we conducted a series of interviews with practicing architects. Our case study

  7. Software Security Analysis: an Example Case Study

    Abstract. This chapter presents an example outlining the process and results of a software security risk analysis. Unlike other types of security risk analyses, a software security analysis focuses on the design and implementation of the online application rather than the network and physical environment in which the application is deployed.

  8. A Case Study of Introducing Security Risk Assessment in

    Security has become a critical part of nearly every software engineering project and identifying and performing proper activities to ensure security is one of the challenges of software vendors. The work presented in this article proposes the introduction of a risk assessment method in requirement engineering and studies the realities and ...

  9. PDF Enterprise-Driven Open Source Software: A Case Study on Security Automation

    Hence, integrating security activities with industrial practices, such as continuous integration (CI) pipelines, is necessary to detect security flaws and adhere to regulators' demands early. In this paper, we analyze automated security activities in CI pipelines of enterprise-driven open source software (OSS).

  10. (PDF) Secure Software Engineering: Learning from the Past to Address

    Each view is capturing a particular relevant aspect of secure software engineering. Our motivations for developing this framework are to: (a) help understand and clarify the secure software engineering domain, (b) guide in classifying and comparing both secure software and securing approaches and (c) help researchers to identify new research axes.

  11. The practice of secure software development in SDLC: an investigation

    Case studies are used for exploratory investigations that attempt to understand and explain a phenomenon. They are generally observational or descriptive in nature and well-suited to "how" and "why" questions. ... Moreover, managers and developers can use the model to engineer software that is more secure and well-prepared early in the ...

  12. Security assurance cases—state of the art of an emerging

    1 Introduction. A security assurance case (a.k.a. security case, or SAC) is a structured set of arguments that are supported by material evidence and can be used to reason about the security posture of a software system. SACs represent an emerging trend in the secure development of critical systems, especially in domains like automotive and ...

  13. Automated Security Findings Management: A Case Study in Industrial

    Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities. ... Guidelines for Conducting and Reporting Case Study Research in Software Engineering. Empirical Softw. Engg. 14, 2 (apr 2009), 131--164. Digital Library. Google Scholar [29]

  14. Case Study Research in Software Engineering

    For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may ...

  15. Syllabus: Engineering Secure Software

    Software Security Engineering: A Guide for Project Managers by Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, and Nancy Mead. Addison-Wesley, ISBN 978--32-150917-8; Course Info. ... Case Study Project. See Case Study. Web Application Fuzzer project. We will be building a web application fuzz testing tool for automating the ...

  16. Security Requirements Engineering for Software Systems: Case Studies in

    Software engineering curricula too often neglect the development of security requirements for software systems. As a consequence, programmers often produce buggy code with weak security measures. This report focuses on three case studies in which graduate students applied a novel security requirements engineering methodology to real-world software development projects. The experiences showed ...

  17. Systematic Literature Review on Security Risks and its Practices in

    study on security approaches in secure software engineering,' ' IEEE Access , vol. 9, pp. 19139-19160, 2021. [33] G. McGraw , ''From the ground up: The DIMACS software security

  18. Secure Software Delivery Within Untrusted Environments at Scale with

    Explore a case study on secure software delivery in untrusted environments at scale using EVE and K3s in this 38-minute conference talk. Learn how the world's second-largest auto manufacturer modernizes its dealership infrastructure across 70,000 locations in 150 countries to meet regulatory requirements for secure vehicle firmware updates.

  19. Security in Agile Development: Pedagogic Lessons from an

    In terms of lessons learned from this empirical case study, the student project team represents a potential sample of developers who are (1) learning agile development techniques for the first time, and (2) learning secure software engineering and programming techniques for the first time.

  20. An Exploratory Study on Fine-Tuning Large Language Models for Secure

    Computer Science > Software Engineering. arXiv:2408.09078 (cs) [Submitted on 17 Aug 2024] Title: An Exploratory Study on Fine-Tuning Large Language Models for Secure Code Generation. Authors ... We crawled a fine-tuning dataset (14,622 C and C++ files) for secure code generation by collecting code fixes of confirmed vulnerabilities from open ...

  21. Ben Harting

    Network security architect CCNA, CCNP Enterprise, CCNP Security, CyberOps Associate, CCIE Enterprise Infrastructure, Cisco Certified DevNet Associate, Cisco Certified DevNet Professional ... Systems engineer CCNA, CCNP Enterprise, DevNet Associate. Read Olivia's story. View all success stories. Share your Cisco Certification Success Story.

  22. A Case Study of Introducing Security Risk Assessment in Requirements

    A Case Study of Introducing Security Risk Assessment in Requirements Engineering in a Large Organization. Authors: Shanai Ardi, ... Runeson P and Höst M Guidelines for conducting and reporting case study research in software engineering J Empirical Softw Eng Springer 2009 14 2 131-164. Crossref. Google Scholar [34]

  23. Case Study

    Overview The purpose of the case study project is to get you acquainted with the security challenges of a real, complex, messy software product. In class, you learn about security ideals, common mistakes, and best practices. In the case study, you will see how those ideals are applied (or not applied!) to actual problems. This case study is designed to help you in two key ways: investigation ...

  24. White House to Spend $11 Million to Study Open Source Software Use

    Hardening the security around open source software has been a key part of the White House's larger cybersecurity efforts since President Biden released his executive order for improving the United States' security posture in May 2021, only months after taking office.. Now the Biden Administration and the Department of Homeland Security (DHS) are putting $11 million to launch a program ...

  25. Teamcenter PLM

    See how even the smallest start-up business can grow with Teamcenter X. Cloud SaaS PLM is instant-on for fast time to value. You can manage your product digital twin efficiently to bring new and innovative products to market faster - and grow your business.

  26. Insights Towards Better Case Study Reporting in Software Engineering

    Case studies are a popular and noteworthy type of research study in software engineering, offering significant potential to impact industry practices by investigating phenomena in their natural contexts. ... Guidelines for conducting and reporting case study research in software engineering. Empirical software engineering 14 (2009), 131--164 ...

  27. Security Challenges in Software Engineering for the Cloud: A

    Some of the notable reviewed articles regarding either software engineering and its role on cloud security issues or just cloud computing issues include an article by Kaur and Singh [], which is a review of cloud computing security issues.The authors assert that third-party inclusion on cloud services is one of the significant security concerns although it is important to note that the authors ...

  28. PDF A Case Study of Introducing Security Risk Assessment in

    cons of having centralized, distributed, or semi-distributed workforce for security assurance in requirements engineering. Keywords Security · Requirements analysis · Risk assessment · Process improvement Introduction Many software products are used in sensitive infrastruc-tures where software malfunctions or security vulnerabili-

  29. Switches der Cisco Catalyst 9300-Serie

    Switches der Cisco Catalyst 9300-Serie sind auf Sicherheit, IoT und die Cloud ausgelegt. Schaffen Sie eine sichere Grundlage, die optimierte Automatisierung und Einfachheit sowie umfassende Einblicke ermöglicht.