Skip to:Content
|
Bottom
Cover image for Engineering safe and secure software systems
Title:
Engineering safe and secure software systems
Personal Author:
Series:
Artech House information security and privacy series
Publication Information:
Norwood, M.A. : Artech House, c2013
Physical Description:
326 p. : ill. ; 24 cm.
ISBN:
9781608074723

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010301462 QA76.9.A25 A93 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

Offers a detailed understanding of software systems engineering from both security and safety perspectives. This book explains how processes relevant to the creation and operation of software systems should be determined and improved, how projects should be managed, and how products can be assured.


Author Notes

C. Warren Axelrod is the president of C. Warren Axelrod, LLC. He is also a senior consultant with Delta Risk LLC and the research director for financial services for the U.S. Cyber Consequences Unit. He was chief privacy officer and business information security officer for U.S. Trust and a senior information technology and information security executive at such companies as HSBC Securities, Bank of America, and Pershing LLC. He has contributed to numerous conferences and seminars, and has published extensively. Dr. Axelrod is a coeditor of Enterprise Information Security and author of Privacy and Outsourcing Information Security (Artech House 2009, 2004). He holds a Ph.D. in managerial economics from Cornell University, as well as a B.Sc. in electrical engineering and an M.A. in economics and statistics from Glasgow University. He is certified as a CISSP and CISM.


Table of Contents

Prefacep. xvii
Forewordp. xxi
1 Introductionp. 1
Preamblep. 1
Scope and Structure of the Bookp. 3
Acknowledgmentsp. 4
Endnotesp. 5
2 Engineering Systemsp. 7
Introductionp. 8
Some Initial Observationsp. 8
Deficient Definitionsp. 11
Rationalep. 12
What are Systems?p. 13
Deconstructing Systems Engineeringp. 16
What Is Systems Engineering?p. 19
Systems Engineering and the Systems Engineering Management Processp. 20
The DoD Textp. 22
Another Observationp. 22
More on Systems Engineeringp. 23
The Systems Engineering Process (SEP)p. 23
Summary and Conclusionsp. 26
Endnotesp. 26
3 Engineering Software Systemsp. 29
Introductionp. 29
The Great Debatep. 31
Some Observationsp. 32
Rationalep. 33
Understanding Software Systems Engineeringp. 34
Deconstructing Software Systems Engineeringp. 34
What Is Software?p. 35
What Are Software Systems?p. 36
Are Control Software Systems Different?p. 42
What is Software Systems Engineering?p. 42
The Software Systems Engineering Processp. 44
Steps in the Software Development Processp. 44
Omissions or Lack of Attentionp. 48
Nonfunctional Requirementsp. 48
Testing Nonfunctional Attributesp. 49
Verification and Validationp. 49
Creating Requisite Functional and Nonfunctional Datap. 52
Resiliency and Availabilityp. 55
Decommissioningp. 56
Summary and Conclusionsp. 56
Endnotesp. 57
4 Engineering Secure and Safe Systems, Part Ip. 59
Introductionp. 59
The Approachp. 60
Security Versus Safetyp. 60
Four Approaches to Developing Critical Systemsp. 63
The Dependability Approachp. 64
The Safety Engineering Approachp. 65
The Secure Systems Approachp. 67
The Real-Time Systems Approachp. 68
Security-Critical and Safety-Critical Systemsp. 68
Summary and Conclusionsp. 70
Endnotesp. 70
5 Engineering Secure and Safe Systems, Part 2p. 73
Introductionp. 73
Approachp. 75
Reducing the Safety-Security Deficitp. 76
Game-Changing and Clean-Slate Approachesp. 77
A Note on Protectionp. 81
Safety-Security Governance Structure and Risk Managementp. 83
An Illustrationp. 83
The General Development Life Cyclep. 84
Structure of the Software Systems Development Life Cyclep. 86
Life Cycle Processesp. 89
Governance Structure for Systems Engineering Projectsp. 92
Risks of Security-Oriented Versus Safety-Oriented Software Systemsp. 94
Expertise Needed at Various Stagesp. 95
Summary and Conclusionsp. 95
Endnotesp. 96
6 Software Systems Security and Safety Riskp. 99
Introductionp. 99
Understanding Riskp. 100
Risks of Determining Riskp. 100
Software-Related Risksp. 101
Motivations for Risk Mitigationp. 103
Defining Riskp. 104
Assessing and Calculating Riskp. 105
Threats Versus Exploitsp. 107
Threat Risk Modelingp. 111
Threats from Safety-Critical Systemsp. 114
Creating Exploits and Suffering Eventsp. 116
Vulnerabilitiesp. 119
Application Risk Management Considerationsp. 120
Subjective vs. Objective vs. Personal Riskp. 121
Personalization of Riskp. 122
The Fallacies of Data Ownership, Risk Appetite, and Risk Tolerancep. 122
The Dynamics of Riskp. 124
A Holistic View of Riskp. 125
Summary and Conclusionsp. 126
Endnotesp. 128
7 Software System Security and Safety Metricsp. 131
Introductionp. 131
Obtaining Meaningful Datap. 133
Defining Metricsp. 133
Differentiating Between Metrics and Measuresp. 135
Software Metricsp. 138
Measuring and Reporting Metricsp. 140
Metrics for Meeting Requirementsp. 143
Risk Metricsp. 146
Consideration of Individual Metricsp. 146
Security Metrics for Software Systemsp. 150
Safety Metrics for Software Systemsp. 151
Summary and Conclusionsp. 152
Endnotesp. 153
8 Software System Development Processesp. 157
Introductionp. 157
Processes and Their Optimizationp. 158
Processes in Relation to Projects and Products/Servicesp. 159
Some Definitionsp. 161
Chronology of Maturity Modelsp. 164
Security and Safety in Maturity Modelsp. 165
FAA Modelp. 165
The +SAFE VI .2 Extension .p. 167
The +SECURE V1.3 Extensionp. 167
The CMMI® Approachp. 167
General CMMI®p. 167
CMMI® for Developmentp. 168
Incorporating Safety and Security Processesp. 169
+SAFE V1.2 Comparisonsp. 169
+SECURE V1.2 Comparisonsp. 172
Summary and Conclusionsp. 173
Endnotesp. 175
9 Secure SSDLC Projects in Greater Detailp. 177
Introductionp. 177
Different Terms, Same or Different Meaningsp. 178
Creating and Using Software Systemsp. 180
Phases and Steps of the SSDLCp. 182
Summary and Conclusionsp. 191
Endnotesp. 193
10 Safe SSDLC Projects in Greater Detailp. 195
Introductionp. 195
Definitions and Termsp. 196
Hazard Analysisp. 198
Software Requirements Hazard Analysisp. 199
Top-Level Design Hazard Analysisp. 200
Detailed Design Hazard Analysisp. 201
Code-Level Software Hazard Analysisp. 201
Software Safety Testingp. 201
Software/User Interface Analysisp. 202
Software Change Hazard Analysisp. 203
The Safe Software System Development Lifecyclep. 204
Combined Safety and Security Requirementsp. 207
Summary and Conclusionsp. 208
Endnotesp. 209
11 The Economics of Software Systems' Safety and Securityp. 211
Introductionp. 211
Closing the Gapp. 212
Technical Debtp. 214
Application of Technical Debt Concept to Security and Safetyp. 215
System Obsolescence and Replacementp. 217
The Responsibility for Safety and Security by Individuals and Groupsp. 218
Basic Ideap. 218
Extending the Modelp. 219
Concept and Requirements Phasep. 219
Design and Architecture Phasep. 222
Developmentp. 223
Verificationp. 224
Validationp. 224
Deployment, Operations, Maintenance, and Technical Supportp. 225
Decommissioning and Disposalp. 226
Overall Impressionp. 226
Methods for Encouraging Optimal Behaviorp. 226
Pricingp. 227
Chargebackp. 227
Costs and Risk Mitigationp. 228
Management Mandatep. 228
Legislationp. 229
Regulationp. 229
Standards and Certificationsp. 229
Going Forwardp. 230
Tamperingp. 231
Tamper Evidencep. 231
Tamper Resistancep. 232
Tamperproofingp. 232
A Brief Note on Patternsp. 234
Conclusionsp. 236
Endnotesp. 238
Appendix A Software Vulnerabilities, Errors, and Attacksp. 239
Ranking Errors, Vulnerabilities, and Risksp. 240
The OWASP Top Security Risksp. 241
The CWE/SANS Most Dangerous Software Errorsp. 244
Top-Ranking Safety Issuesp. 244
Enumeration and Classificationp. 246
WASC Threat Classificationp. 248
Summary and Conclusionsp. 250
Endnotesp. 250
Appendix B Comparison of IS0/IEC 12207 and CMMP®-DEV Process Areasp. 253
Appendix C Security-Related Tasks in the Secure SSDLCp. 257
Task Areas for SSDLC Phasesp. 258
Involvement by Teams and Groups for Secure SSDLC Phasesp. 262
A Note on Sourcesp. 288
Endnotesp. 288
Appendix D Safety-Related Tasks in the Safe SSDLCp. 289
Task Areas for Safe SSDLC Phasesp. 289
Levels of Involvementp. 309
A Note on Sourcesp. 309
Endnotesp. 313
About the Authorp. 315
Indexp. 317
Go to:Top of Page