Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

被引:0
|
作者
Williams, Laurie [1 ]
Gegick, Michael [1 ]
Meneely, Andrew [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Software security; Wideband Delphi; Protection Poker; Planning Poker;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of a vulnerability, or knowing the best mitigation strategy. We propose the Protection Poker activity as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants. An excellent outcome of Protection Poker is that security knowledge passed around the team. Students in an advanced undergraduate software engineering course at North Carolina State University participated in a Protection Poker session conducted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to a more effective software security learning experience than in prior semesters. A pilot of the use of Protection Poker with an industrial partner began in October 2008. ne first security discussion structured via Protection Poker caused two requirements to be revised for added security fortification led to the immediate identification of one vulnerability in the system, initiated a meeting on the prioritization of security defects; and instigated a call for an education session on preventing cross site scripting vulnerabilities.
引用
收藏
页码:122 / 134
页数:13
相关论文
共 50 条
  • [31] System Security Assessment Method Integrating Risk Relationships of Open Source Software
    Zhang, Hongbin
    Ren, Qingqing
    Liu, Bin
    Zhao, Dongmei
    Li, Ying
    Qi, Mingyue
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 21 - 27
  • [32] A Data-Driven Security Risk Assessment Scheme for Personal Data Protection
    Cha, Shi-Cho
    Yeh, Kuo-Hui
    IEEE ACCESS, 2018, 6 : 50510 - 50517
  • [33] Risk assessment software
    不详
    INTERNATIONAL GAS ENGINEERING AND MANAGEMENT, 2000, 40 (02): : 26 - 26
  • [34] Knowledge Transfer Software Fault Learning
    Singh, Pradeep
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1109 - 1114
  • [35] An Approach to Knowledge Transfer in Software Measurement
    Soini, Jari
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2007, 31 (04): : 437 - 446
  • [36] On facilitating knowledge transfer in software design
    Heliades, GP
    Edmonds, EA
    KNOWLEDGE-BASED SYSTEMS, 1999, 12 (07) : 391 - 395
  • [37] Innovative Strategies for Protection Security Assessment
    Romeis, Christian
    Fuchs, Jochen
    Jaeger, Johann
    Krebs, Rainer
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [38] Software Vulnerability and Application Security Risk
    Peng, Jianping
    Guo, Meiwen
    Quan, Jing
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2019, 32 (01) : 48 - 57
  • [39] Structuring legal knowledge on data protection: The EU-data protection research project DAPRO
    Kilian, W
    Funkat, D
    11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, PROCEEDINGS, 2000, : 1061 - 1065
  • [40] An Overview of the Modern Methods of Security and Protection of Software Systems
    O. O. Letychevskyi
    V. S. Peschanenko
    Y. V. Hryniuk
    V. Yu. Radchenko
    V. M. Yakovlev
    Cybernetics and Systems Analysis, 2019, 55 : 840 - 850