Lecture Software engineering (7/e): Chapter 30 – Ian Sommerville

In this chapter, the learning objectives are: To introduce issues that must be considered in the specification and design of secure software; to discuss security risk management and the derivation of security requirements from a risk analysis; to describe good design practice for secure systems development; to explain the notion of system survivability and to introduce a method of survivability analysis. | Security Engineering Objectives To introduce issues that must be considered in the specification and design of secure software To discuss security risk management and the derivation of security requirements from a risk analysis To describe good design practice for secure systems development. To explain the notion of system survivability and to introduce a method of survivability analysis. Topics covered Security concepts Security risk management Design for security System survivability Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Security engineering System layers Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. Infrastructure security is a systems management problem where the infrastructure is configured . | Security Engineering Objectives To introduce issues that must be considered in the specification and design of secure software To discuss security risk management and the derivation of security requirements from a risk analysis To describe good design practice for secure systems development. To explain the notion of system survivability and to introduce a method of survivability analysis. Topics covered Security concepts Security risk management Design for security System survivability Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Security engineering System layers Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks. The focus of this chapter is application security. Security concepts Examples of security concepts Security threats Threats to the confidentiality of a system or its data Threats to the integrity of a system or its data Threats to the availability of a system or its data Security controls Controls that are intended to ensure that attacks are unsuccessful. This is analagous to fault avoidance. Controls that are intended to detect and repel attacks. This is analagous to fault detection and tolerance. Controls that are intended to support recovery from problems. This is analagous to fault recovery. Security risk management Risk management is concerned with assessing the possible losses that might ensue from attacks on the system and balancing these losses against the costs of security procedures that may reduce these losses. Risk management should be driven by an organisational security policy. Risk management involves Preliminary risk assessment Life cycle risk .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.