The 7 qualities of highly secure software. (2012)
- Record Type:
- Book
- Title:
- The 7 qualities of highly secure software. (2012)
- Main Title:
- The 7 qualities of highly secure software
- Other Titles:
- Seven qualities of highly secure software
- Further Information:
- Note: Mano Paul.
- Other Names:
- Paul, Mano
- Contents:
- Preface Quality Security Is Built In versus Bolted On (Be Proactive); Prelude: The Ant and the Grasshopper; Introduction; Security Myths That Need Busting; Myth #1: We Have a Firewall; Myth #2: We Use SSL; Myth #3: We Have Intrusion Detection Systems and Intrusion Prevention Systems (IDSs/IPSs); Myth #4: Our Software Will Not Be Accessible from the Internet; Myth #5: We Have Never Been Compromised; Myth #6: Security Is "Not my Job" but the Responsibility of the Service Provider; Myth #7: Security Adds Little to No Value to the Business; Build Security In: The Need; Build Security In: What It Takes; Build Security In: The Value-Add; Conclusion; References Quality Functionality Maps to a Security Plan; (Begin with the End in Mind); Prelude: Breaking the Tape Introduction; What Is a Security Plan?; Security Plan Development; Step 1: Identify Security Objectives; Step 2: Identify Applicable Requirements; Step 3: Identify Threats; Step 4: Identify Applicable Controls; Benefits of a Security Plan; Mapped Software; Conclusion; References Quality Includes Foundational Assurance Elements (Put First Things First); Prelude: What Lies Beneath?; Introduction; Data: The New Frontier; Data Under Siege; The Foundational Assurance Elements; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Conclusion; References Quality Is Balanced (Think Win-Win); Prelude : The Clown Fish and the Anemone; Introduction; The Balancing Scale: Risk and Reward; The BalancingPreface Quality Security Is Built In versus Bolted On (Be Proactive); Prelude: The Ant and the Grasshopper; Introduction; Security Myths That Need Busting; Myth #1: We Have a Firewall; Myth #2: We Use SSL; Myth #3: We Have Intrusion Detection Systems and Intrusion Prevention Systems (IDSs/IPSs); Myth #4: Our Software Will Not Be Accessible from the Internet; Myth #5: We Have Never Been Compromised; Myth #6: Security Is "Not my Job" but the Responsibility of the Service Provider; Myth #7: Security Adds Little to No Value to the Business; Build Security In: The Need; Build Security In: What It Takes; Build Security In: The Value-Add; Conclusion; References Quality Functionality Maps to a Security Plan; (Begin with the End in Mind); Prelude: Breaking the Tape Introduction; What Is a Security Plan?; Security Plan Development; Step 1: Identify Security Objectives; Step 2: Identify Applicable Requirements; Step 3: Identify Threats; Step 4: Identify Applicable Controls; Benefits of a Security Plan; Mapped Software; Conclusion; References Quality Includes Foundational Assurance Elements (Put First Things First); Prelude: What Lies Beneath?; Introduction; Data: The New Frontier; Data Under Siege; The Foundational Assurance Elements; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Conclusion; References Quality Is Balanced (Think Win-Win); Prelude : The Clown Fish and the Anemone; Introduction; The Balancing Scale: Risk and Reward; The Balancing Scale: Functionality and Assurance; The Balancing Scale: Threats and Controls; Conclusion; References Quality Incorporates Security Requirements; (Seek First to Understand, Then to be Understood); Prelude: Lost in Translation; Introduction; Types of Software Security Requirements; Techniques to Elicit Software Security Requirements; Traceability of Software Security Requirements; Requirements to Retirement; Conclusion; References Quality Is Collaboratively Developed; (Synergize); Prelude: There Is No "I" in Team!; Introduction; Stakeholders in the Game: Whose Perspective?; Business; Security; Management; Development; Legal; Privacy; Auditors; Vendors; Conclusion; References Quality Is Adaptable (Sharpen the Saw); Prelude: The Shark is a Polyphyodont; Introduction; The Law of Resiliency Degradation; Software Adaptability: Technology, Threats, and Talent; Technology; Threats; Talent; Begin with the Future in Mind; Secure Software Requires Security-Savvy; People; Conclusion; References Epilogue; Quality Habits Index … (more)
- Publisher Details:
- Place of publication not identified : Auerbach Publications
- Publication Date:
- 2012
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8
Computer security - Languages:
- English
- ISBNs:
- 9781466566545
- Related ISBNs:
- 146656654X
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143551
- Ingest File:
- 02_035.xml