Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

被引:0
|
作者
Williams, Laurie [1 ]
Gegick, Michael [1 ]
Meneely, Andrew [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Software security; Wideband Delphi; Protection Poker; Planning Poker;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of a vulnerability, or knowing the best mitigation strategy. We propose the Protection Poker activity as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants. An excellent outcome of Protection Poker is that security knowledge passed around the team. Students in an advanced undergraduate software engineering course at North Carolina State University participated in a Protection Poker session conducted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to a more effective software security learning experience than in prior semesters. A pilot of the use of Protection Poker with an industrial partner began in October 2008. ne first security discussion structured via Protection Poker caused two requirements to be revised for added security fortification led to the immediate identification of one vulnerability in the system, initiated a meeting on the prioritization of security defects; and instigated a call for an education session on preventing cross site scripting vulnerabilities.
引用
收藏
页码:122 / 134
页数:13
相关论文
共 50 条
  • [21] Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
    Elder, Sarah E.
    Zahan, Nusrat
    Kozarev, Val
    Shu, Rui
    Menzies, Tim
    Williams, Laurie
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), 2021, : 95 - 104
  • [22] Software security in practice: knowledge and motivation
    Assal, Hala
    Morkonda, Srivathsan G.
    Arif, Muhammad Zaid
    Chiasson, Sonia
    JOURNAL OF CYBERSECURITY, 2025, 11 (01):
  • [23] Development and Calibration of Space Debris Risk Assessment & Protection Optimization Software
    Han Zengyao Qu Guangji
    AerospaceChina, 2005, (01) : 18 - 19
  • [24] Structuring content for a knowledge transfer using multiple media
    Schoop, E
    Anders, A
    WIRTSCHAFTSINFORMATIK, 2001, 43 (01): : 47 - +
  • [25] Research on airspace security risk assessment technology based on knowledge Graph
    Yang, Ying
    Huang, Chenghao
    Zhang, Hongbo
    Feng, Chaohui
    Wang, Zhisen
    Cui, Zhe
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 980 - 986
  • [26] Risk Assessment of Physical Security within a Technologized Knowledge Based Organization
    Titu, Mihail Aurel
    Pop, Alina Bianca
    Ceocea, Costel
    MODERN TECHNOLOGIES IN MANUFACTURING (MTEM 2019), 2019, 299
  • [27] Software protection: Security's last stand?
    Stytz, Martin R.
    Whittaker, James A.
    IEEE Security and Privacy, 2003, 1 (01): : 95 - 98
  • [28] A Security Game Model for Remote Software Protection
    Basilico, Nicola
    Lanzi, Andrea
    Monga, Mattia
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 437 - 443
  • [29] Integrating a Flexible Modeling Framework (IMF) with the network security assessment instrument to reduce software security risk
    Gilliam, DP
    Powell, JD
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 153 - 158
  • [30] Longitudinal risk-based security assessment of docker software container images
    Mills, Alan
    White, Jonathan
    Legg, Phil
    COMPUTERS & SECURITY, 2023, 135