Strong security starts with software development

被引:5
|
作者
Cope R. [1 ]
机构
[1] Perforce Software
关键词
While there is – rightly – a big focus on securing software that is already deployed; the reality is that many future vulnerabilities stem from the creation of that software. Insecure applications give hackers a back door. For instance; buffer overflows and code injection attacks can lead to compromised confidentiality of data; loss of service; damage to the systems of thousands of users; even – in the case of products containing embedded software; such as medical equipment or vehicles – risk to life. While we focus on securing software that is already deployed; the reality is that many future vulnerabilities stem from the creation of that software. Securing development is a tough challenge due to the increasing complexity of software; the volume of code; multiple contributors; distributed teams and the pressure to deliver to tight deadlines. Plus; developers traditionally have not been focused on security. That is changing with the emergence of DevSecOps; which focuses on implementing software security practices and tools at every stage of the lifecycle; explains Rod Cope of Perforce Software. © 2020 Elsevier Ltd;
D O I
10.1016/S1353-4858(20)30078-7
中图分类号
学科分类号
摘要
While there is – rightly – a big focus on securing software that is already deployed, the reality is that many future vulnerabilities stem from the creation of that software. Insecure applications give hackers a back door. For instance, buffer overflows and code injection attacks can lead to compromised confidentiality of data, loss of service, damage to the systems of thousands of users, even – in the case of products containing embedded software, such as medical equipment or vehicles – risk to life. While we focus on securing software that is already deployed, the reality is that many future vulnerabilities stem from the creation of that software. Securing development is a tough challenge due to the increasing complexity of software, the volume of code, multiple contributors, distributed teams and the pressure to deliver to tight deadlines. Plus, developers traditionally have not been focused on security. That is changing with the emergence of DevSecOps, which focuses on implementing software security practices and tools at every stage of the lifecycle, explains Rod Cope of Perforce Software. © 2020 Elsevier Ltd
引用
收藏
页码:6 / 9
页数:3
相关论文
共 50 条
  • [31] Security Thinking in Online Freelance Software Development
    Rauf, Irum
    Petre, Marian
    Tun, Thein
    Lopez, Tamara
    Nuseibeh, Bashar
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING IN SOCIETY, ICSE-SEIS, 2023, : 13 - 24
  • [32] Security in agile software development: A practitioner survey
    Rindell, Kalle
    Ruohonen, Jukka
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppänen, Ville
    Information and Software Technology, 2021, 131
  • [33] The Effects of Required Security on Software Development Effort
    Venson, Elaine
    2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020), 2020, : 166 - 169
  • [34] Security in agile software development: A practitioner survey
    Rindell, Kalle
    Ruohonen, Jukka
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppanen, Ville
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 131
  • [35] Security Considerations for the Development of Secure Software Systems
    Ruggieri, Maxwell
    Hsu, Tzu-Tang
    Ali, Md Liakat
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1187 - 1193
  • [36] Security Aspects During the Embedded Software Development
    Adamczyk, Heiko
    AT-AUTOMATISIERUNGSTECHNIK, 2010, 58 (09) : 512 - 522
  • [37] Software Development Life Cycle Security Issues
    Kaur, Daljit
    Kaur, Parminder
    2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
  • [38] Development of Security Software: A High Assurance Methodology
    Hardin, David
    Hiratzka, T. Douglas
    Johnson, D. Randolph
    Wagner, Lucas
    Whalen, Michael
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 266 - 285
  • [39] An integrated approach to security in software development methodologies
    Raman, Abhay
    Muegge, Steven
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1921 - 1924
  • [40] Year starts strong for biotech IPOs
    Cross, Ryan
    CHEMICAL & ENGINEERING NEWS, 2020, 98 (08) : 10 - 10