csce548-lect1 - CSCE 548 CSCE 548 Building Secure Software...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSCE 548 CSCE 548 Building Secure Software Building Secure Software CSCE 727 - Farkas 2 Reading Reading This lecture: McGraw: Chapter 1 Recommended: CyberInsecurity: The Cost of Monopoly, http://cryptome.org/cyberinsecurity.htm Next lecture: McGraw: Chapter 2 CSCE 727 - Farkas 3 Why do we need software Why do we need software security? security? Software is essential in most every aspect of our life CSCE 727 - Farkas 4 How to address software How to address software security? security? Do not address at all Ad-hoc evaluation Add security features after the fact Identify security vulnerabilities Test security level Incorporate security throughout of SDLC CSCE 727 - Farkas 5 This Course This Course Not a software engineering course Understand basic security concepts and their impact Introduce systematic security design and development along project management Best practices CSCE 727 - Farkas 6 Security Objectives Security Objectives...
View Full Document

This note was uploaded on 12/13/2011 for the course CSCE 548 taught by Professor Farkas during the Spring '10 term at South Carolina.

Page1 / 16

csce548-lect1 - CSCE 548 CSCE 548 Building Secure Software...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online