The 7 qualities of highly secure software

  • 1 Have read
Locate

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 1 Have read

Buy this book

Last edited by ImportBot
December 20, 2023 | History

The 7 qualities of highly secure software

  • 1 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Publisher
CRC Press
Language
English
Pages
144

Buy this book

Edition Availability
Cover of: 7 Qualities of Highly Secure Software
7 Qualities of Highly Secure Software
2012, Auerbach Publishers, Incorporated
in English
Cover of: 7 Qualities of Highly Secure Software
7 Qualities of Highly Secure Software
2012, Taylor & Francis Group
in English
Cover of: 7 Qualities of Highly Secure Software
7 Qualities of Highly Secure Software
2012, Auerbach Publishers, Incorporated
in English
Cover of: 7 Qualities of Highly Secure Software
7 Qualities of Highly Secure Software
2012, Auerbach Publishers, Incorporated
in English
Cover of: The 7 qualities of highly secure software
The 7 qualities of highly secure software
2012, CRC Press
in English
Cover of: 7 Qualities of Highly Secure Software
7 Qualities of Highly Secure Software
2012, Auerbach Publishers, Incorporated
in English

Add another edition?

Book Details


Table of Contents

Machine generated contents note: 1.Quality #1: Security Is Built In, Not Bolted On
Prelude: The Ant and the Grasshopper
Introduction
Security Myths That Need Busting
Myth #1 We Have a Firewall
Myth #2 We Use SSL
Myth #3 We Have Intrusion Detection Systems and Intrusion Prevention Systems (IDSs/IPSs)
Myth #4 Our Software Will Not Be Accessible from the Internet
Myth #5 We Have Never Been Compromised
Myth #6 Security Is "Not My Job" but the Responsibility of the Service Provider
Myth #7 Security Adds Little to No Value to the Business
Build Security In: The Need
Build Security In: What It Takes
Build Security In: The Value-Add
Conclusion
References
2.Quality #2: Functionality Maps to a Security Plan
Prelude: Breaking the Tape
Introduction
What Is a Security Plan?
Security Plan Development
Step 1 Identify Security Objectives
Step 2 Identify Applicable Requirements
Step 3 Identify Threats
Contents note continued: Step 4 Identify Applicable Controls
Benefits of a Security Plan
Mapped Software
Conclusion
References
3.Quality #3: Includes Foundational Assurance Elements
Prelude: What Lies Beneath?
Introduction
Data: The New Frontier
Data under Siege
Foundational Assurance Elements
Confidentiality
Integrity
Availability
Authentication
Authorization
Auditing
Conclusion
References
4.Quality #4: Is Balanced
Prelude: The Clown Fish and the Anemone
Introduction
Balancing Scale: Risk and Reward
Balancing Scale: Functionality and Assurance
Balancing Scale: Threats and Controls
Conclusion
References
5.Quality #5: Incorporates Security Requirements
Prelude: Lost in Translation
Introduction
Types of Software Security Requirements
Techniques to Elicit Software Security Requirements
Traceability of Software Security Requirements
Requirements to Retirement
Conclusion
Contents note continued: References
6.Quality #6: Is Developed Collaboratively
Prelude: There Is No "I" in Team!
Introduction
Stakeholders in the Game: Whose Perspective?
Business
Security
Management
Development
Legal
Privacy
Auditors
Vendors
Conclusion
References
7.Quality #7: Is Adaptable
Prelude: The Shark is a Polyphyodont
Introduction
Law of Resiliency Degradation
Software Adaptability: Technology, Threats, and Talent
Technology
Threats
Talent
Begin with the Future in Mind
Secure Software Requires Security-Savvy People
Conclusion
References
8.Epilogue.

Edition Notes

"An Auerbach book."

Includes bibliographical references and index.

Published in
Boca Raton, FL
Other Titles
Seven qualities of highly secure software

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.76.D47 P3774 2012, QA76.9.A25, QA76.9.A25b

The Physical Object

Pagination
xvi, 144 p.
Number of pages
144

ID Numbers

Open Library
OL30440925M
ISBN 10
1439814465
ISBN 13
9781439814468
LCCN
2012405842
OCLC/WorldCat
809754903, 798535861

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
December 20, 2023 Edited by ImportBot import existing book
February 3, 2023 Edited by ImportBot import existing book
December 9, 2022 Edited by MARC Bot import existing book
September 17, 2021 Edited by ImportBot import existing book
September 22, 2020 Created by MARC Bot Imported from Library of Congress MARC record