csce522-lect9 - CSCE 522 Lecture 11 Lecture Building Secure...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 522 CSCE 522 Lecture 11 Lecture 11 Building Secure Software Building Secure Software
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 2 Reading Reading This lecture Pfleeger: Ch. 3.1, Ch 3.2 G. McGraw, Software Security , http://www.cigital.com/papers/download/bsi1-swsec.pdf NEW!: SANS Inst., The Top 25 Software Errors, http://www.sans.org/top25-software-errors/#cat1 Next Lecture Pfleeger: Ch. 3.3 – 3.9
Background image of page 2
Software Engineering Software Engineering Functional requirements Software Engineering Life Cycle CSCE 522 - Farkas 3 Copyright: The following slides on SDLC are modified from Project Cartoon http://www.projectcartoon.com/cartoon/1078
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How the customer imagined it How the customer imagined it CSCE 522 - Farkas 4
Background image of page 4
What the business analyst What the business analyst understood understood CSCE 522 - Farkas 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How the architect designed it How the architect designed it CSCE 522 - Farkas 6
Background image of page 6
What development believed What development believed the architect was describing the architect was describing CSCE 522 - Farkas 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How the programmer How the programmer implemented it implemented it CSCE 522 - Farkas 8
Background image of page 8
How the project manager How the project manager explained it explained it CSCE 522 - Farkas 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How the project was How the project was documented documented CSCE 522 - Farkas 10
Background image of page 10
What operations installed What operations installed CSCE 522 - Farkas 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How the client was billed How the client was billed CSCE 522 - Farkas 12
Background image of page 12
Portion of original code that Portion of original code that still can be used still can be used CSCE 522 - Farkas 13
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What the client really needed What the client really needed CSCE 522 - Farkas 14
Background image of page 14
So if software engineering is hard So if software engineering is hard already, why do we want to make it already, why do we want to make it harder by adding security harder by adding security considerations? considerations? CSCE 522 - Farkas 15
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 16 Why do we need software Why do we need software security? security?
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 42

csce522-lect9 - CSCE 522 Lecture 11 Lecture Building Secure...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online