Appraisals Based on Security Best Practices for Software Configurations

被引:0
|
作者
Araujo Neto, Afonso [1 ]
Vieira, Marco [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, CISUC, P-3000 Coimbra, Portugal
关键词
D O I
10.1109/LADC.2009.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Protecting systems and data from malicious access and corruption requires the existence of effective security mechanisms and the correct configuration of those mechanisms. Configuring large software systems for security is a complex task, entailing a lot of expertise that many administrators do not have. This paper proposes a generic methodology to condense widespread information about security best practices into easy-to-use appraisals for three scenarios: 1) to assess how effective software configurations are in terms of fulfilling best practices; 2) to understand the set of best practices that can be implemented when using a given software product; and 3) to evaluate how well a system administrator knows existing security best practices. Following this methodology we defined an appraisal for database systems configurations, which was used to evaluate four real installations. Experimental results show the usefulness of this kind of security appraisals.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 50 条
  • [31] Best practices to help improve system security
    Robinson, Ken
    Control Engineering, 2019, 66 (02)
  • [32] Recommendations and Best Practices for Cloud Enterprise Security
    Ramachandran, Muthu
    Chang, Victor
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 983 - 988
  • [33] AUTOMATED ASSESSMENT OF COMPLIANCE WITH SECURITY BEST PRACTICES
    Anwar, Zahid
    Campbell, Roy
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 173 - 187
  • [34] Best Practices for Tackling Security Early in Development
    Dave, Rutul
    ELECTRONICS WORLD, 2011, 117 (1908): : 10 - 11
  • [35] Best Practices for the Security Evaluation of Biometric Systems
    Fernandez-Saavedra, Belen
    Sanchez-Reillo, Raul
    Liu-Jimenez, Judith
    Gutierrez Ruiz, Jorge
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [36] Containerizing Visualization Software: Experiences and Best Practices
    Solis, Andrew
    Allen, William J.
    Ferlanti, Erik
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2022, 2022,
  • [37] Best Practices for the Organizational Implementation of Software Testing
    Majchrzak, Tim A.
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 3560 - 3569
  • [38] Negotiating "best practices" in package software implementation
    Yeow, Adrian
    Sia, Siew Kien
    INFORMATION AND ORGANIZATION, 2008, 18 (01) : 1 - 28
  • [39] Software configuration management principles and best practices
    Kandt, RK
    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2002, 2559 : 300 - 313
  • [40] Best practices - Upon purchasing HR software
    Bryan, NW
    WORKFORCE, 2000, 79 (06): : 168 - 168