【24h】

Secure Software by Design

机译:通过设计安全软件

获取原文

摘要

Based on the calculated cost of a lost record, Yahoo, who “lost” 3 billion records, would be in debt for 450 BILLION DOLLARS. What drives organizations to seek better methods to protect data? The cost of losing data can be high, and it will get higher. Large organizations are able to withstand the malware onslaught, small and mid-size companies have 50-50 chance of remaining in business. To reduce the damage caused by malware, organizations are investing in technology and research. Current research in supervised machine learning is promising. Small and mid-sized companies do not have security professionals to maintain and monitor them. Another area of research is “Honeypots” and “Red Flags”. These techniques may work in espionage, but “white hat testers” demonstrate that these traps are recognized and avoided. Organizations guilty of a data breach, even with clear evidence of negligence are seldom prosecuted. It is very rare that civil or criminal charges are brought against those negligent of reasonable efforts. Can the current environment change? New technologies will eventually be available for small and mid-sized organizations. Laws are changing to make senior management culpable for negligence in protecting sensitive data. Organizations need another way to protect against a data breach. An alternate, and easier strategy for fighting malware is to write software more difficult to hack. This research is identifying how current software practices, lessons learned from malware software, and a novel method to identify critical code, can reduce successful malware attacks. The objective of the research is to search for and identify critical sections in code that should be modified for reducing vulnerabilities. The critical application logic is identified and alternate designs are implemented making it more difficult for the malware author to locate and modify. This research examines easy processes to learn and apply. The work is applicable for all organization, but the existing focus is on helping small and mid-sized organizations. A goal is to reduce the complexity in designing more secure software. The primary considerations are that there are only small additional burdens on software designers and that management sees business value for supporting and requiring more secure software. Because small and mid-sized organizations are more tightly integrated into the supply chain, it the in the interest of large organization, government agencies and the public that these small and mid-sized organizations create more secure software. With an increasing shortage of cyber security professionals, the short-term alternative is to better train software developers for designing more secure software.
机译:基于丢失的记录,雅虎,谁“失去” 3.十亿条记录的计算成本,将是债务450亿美元。是什么推动了组织寻求更好的方法来保护数据?丢失数据的成本可能很高,而且会获得更高。大型组织能够承受的恶意软件的猛攻,小型和中等规模的公司有50%的机会留在企业。为了减少因恶意软件的破坏,组织在技术和研发的投资。目前在监督的机器学习研究是有希望的。小型和中型公司没有安全专业人员进行维护和监视。另一个研究领域是“蜜罐”和“红旗”。这些技术可以在间谍工作,但“白帽子测试”表明,这些陷阱识别和避免。组织犯了数据泄露的,即使有疏忽的明确证据很少被起诉。这是非常罕见的民事或刑事指控被起诉那些疏忽的合理的努力。可以在当前环境的变化?新技术最终将可用于小型和中型企业。法正在发生改变,使疏忽高级管理人员有罪在保护敏感数据。组织需要另一种方式来防止数据泄露。打击恶意软件的替代,和更容易的策略是写软件更难破解。这项研究是确定如何对现有软件的做法,从流氓软件,并确定关键代码的新方法经验教训,可以减少成功的恶意软件攻击。这项研究的目的是寻找和识别代码的关键部分应该减少漏洞进行修改。关键应用逻辑被识别和替代设计被实现制造用于恶意软件作者来定位并修改它更加困难。这项研究考察了易流程,学习和应用。这项工作是适用于所有组织,但现有的工作重点是帮助小型和中型企业。一个目标是减少设计更安全的软件复杂性。主要考虑是,只有在软件设计师小的额外负担和管理看商业价值支持,并要求更安全的软件。因为小型和中型组织更紧密地集成到供应链,它在大型企业,政府机构和这些小型和中型企业创造更安全的软件公众的利益。随着网络安全专业人才日益短缺,短期替代方案是为了更好地训练软件开发人员设计更安全的软件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号