Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

被引:0
|
作者
Williams, Laurie [1 ]
Gegick, Michael [1 ]
Meneely, Andrew [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Software security; Wideband Delphi; Protection Poker; Planning Poker;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of a vulnerability, or knowing the best mitigation strategy. We propose the Protection Poker activity as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants. An excellent outcome of Protection Poker is that security knowledge passed around the team. Students in an advanced undergraduate software engineering course at North Carolina State University participated in a Protection Poker session conducted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to a more effective software security learning experience than in prior semesters. A pilot of the use of Protection Poker with an industrial partner began in October 2008. ne first security discussion structured via Protection Poker caused two requirements to be revised for added security fortification led to the immediate identification of one vulnerability in the system, initiated a meeting on the prioritization of security defects; and instigated a call for an education session on preventing cross site scripting vulnerabilities.
引用
收藏
页码:122 / 134
页数:13
相关论文
共 50 条
  • [1] Playing Protection Poker for Practical Software Security
    Jaatun, Martin Gilje
    Tondel, Inger Anne
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT (PROFES 2016), 2016, 10027 : 679 - 682
  • [2] Protection Poker: The New Software Security "Game"
    Williams, Laurie
    Meneely, Andrew
    Shipley, Grant
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 14 - 20
  • [3] Development of a software security assessment instrument to reduce software security risk
    Gilliam, DP
    Kelly, JC
    Powell, JD
    Bishop, M
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 144 - 149
  • [4] Quantitative Software Security Risk Assessment Model
    Mkpong-Ruffin, Idongesit
    Umphress, David
    Hamilton, John
    Gilbert, Juan
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 31 - 33
  • [5] Knowledge for software security
    Barnum, S
    McGraw, G
    IEEE SECURITY & PRIVACY, 2005, 3 (02) : 74 - 78
  • [6] Security Risk Growth Models for Software Vulnerability Assessment
    Minohara, Takashi
    Shimakawa, Masaya
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 32 - 35
  • [7] Security Risk Assessment and Protection in the Chemical and Process Industry
    Reniers, Genserik
    Van Lerberghe, Paul
    Van Gulijk, Coen
    PROCESS SAFETY PROGRESS, 2015, 34 (01) : 72 - 83
  • [8] Structuring and Controlling the Knowledge for the Software User Support
    Rats, Juris
    Pede, Inguna
    BALTIC JOURNAL OF MODERN COMPUTING, 2021, 9 (02): : 195 - 209
  • [9] Threat Poker: Solving Security and Privacy Threats in Agile Software Development
    Rygge, Hanne
    Josang, Audun
    SECURE IT SYSTEMS, 2018, 11252 : 468 - 483
  • [10] An Information Security Risk Assessment System Based on Knowledge
    Ma, Jianqiang
    2017 4TH ICMIBI INTERNATIONAL CONFERENCE ON TRAINING, EDUCATION, AND MANAGEMENT (ICMIBI-TEM 2017), 2017, 83 : 376 - 381