Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

被引:0
|
作者
Williams, Laurie [1 ]
Gegick, Michael [1 ]
Meneely, Andrew [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Software security; Wideband Delphi; Protection Poker; Planning Poker;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of a vulnerability, or knowing the best mitigation strategy. We propose the Protection Poker activity as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants. An excellent outcome of Protection Poker is that security knowledge passed around the team. Students in an advanced undergraduate software engineering course at North Carolina State University participated in a Protection Poker session conducted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to a more effective software security learning experience than in prior semesters. A pilot of the use of Protection Poker with an industrial partner began in October 2008. ne first security discussion structured via Protection Poker caused two requirements to be revised for added security fortification led to the immediate identification of one vulnerability in the system, initiated a meeting on the prioritization of security defects; and instigated a call for an education session on preventing cross site scripting vulnerabilities.
引用
收藏
页码:122 / 134
页数:13
相关论文
共 50 条
  • [41] An Overview of the Modern Methods of Security and Protection of Software Systems
    Letychevskyi, O. O.
    Peschanenko, V. S.
    Hryniuk, Y., V
    Radchenko, V. Yu
    Yakovlev, V. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2019, 55 (05) : 840 - 850
  • [42] A neuro-fuzzy security risk assessment system for software development life cycle
    Olusanya, Olayinka Olufunmilayo
    Jimoh, Rasheed Gbenga
    Misra, Sanjay
    Awotunde, Joseph Bamidele
    HELIYON, 2024, 10 (13)
  • [43] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [44] New Lightning Protection Standardization Trends for the Lightning Risk Assessment; Use of the Risk Multilingual 3 Software
    Bouquegneau, Christian
    Lecomte, Pierre
    2010 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY & TECHNICAL EXHIBITION ON EMC RF/MICROWAVE MEASUREMENTS & INSTRUMENTATION, 2010, : 1189 - 1192
  • [45] Automation security - Risk assessment - Methods for risk assessment
    Runde, Markus
    Speth, Walter
    Steffen, Thomas
    Thiel, Christoph
    ATP EDITION, 2016, (1-2): : 48 - 55
  • [46] Groundwater Protection, Risk Awareness, Knowledge Transfer and Public Health: The Role of “Future Custodians”
    P. D. Hynds
    H. M. Murphy
    I. Kelly
    U. Fallon
    Water Resources Management, 2014, 28 : 5199 - 5215
  • [47] Groundwater Protection, Risk Awareness, Knowledge Transfer and Public Health: The Role of "Future Custodians"
    Hynds, P. D.
    Murphy, H. M.
    Kelly, I.
    Fallon, U.
    WATER RESOURCES MANAGEMENT, 2014, 28 (14) : 5199 - 5215
  • [48] Software Security Knowledge Transferring and Learning with Concept Maps
    Wen, Shao-Fang
    2018 2ND INTERNATIONAL CONFERENCE ON E-SOCIETY, E-EDUCATION AND E-TECHNOLOGY (ICSET 2018), 2018, : 51 - 55
  • [49] Structuring the Knowledge for Software Process Appraisal Towards Semi-automated Support
    Roongsangjan, Suppasit
    Sunetnanta, Thanwadee
    Mongkolwat, Pattanasak
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 731 - 736
  • [50] Security Vulnerability Assessment for Software Version Upgrade
    Treetippayaruk, Sirikwan
    Senivongse, Twittie
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 283 - 289