StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Security Quality Requirements - Annotated Bibliography Example

Comments (0) Cite this document
Summary
This paper 'Security Quality Requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build Security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Security Quality Requirements
Read TextPreview

Extract of sample "Security Quality Requirements"

Download file to see previous pages The authors present a detailed explanation as to why software security entails more than simply getting rid of vulnerabilities and carrying out penetration tests, “ determining that such requirements have been satisfied will do nothing to ensure that the software will also behave securely even when it operates correctly” (31). The authors emphasize that IT infrastructure security practices and the techniques of network security do not adequately guard application software against security threats. They propose that software security programs should pursue a risk-management approach in order to set priorities and identify adequate measures. Security engineers and project managers must understand that software security risks will keep changing throughout the SDLC. They need to have the perspective of an attacker so as to address the array of tasks that software should perform, and how to improve the capacity of software to can resist, endure, and recuperate when under attack “the community needs to think creatively and have a firm grasp of the attackers perspective and the approaches used to exploit software” (45). The book contributes to the annotated bibliography collection by providing a wide overview that can help firms to select a set of policies, processes and techniques that are suitable for their security development purposes. This source addresses the entire life cycle of software development with a detailed outline and review of emerging topics and trends which is absent in most publications related to this subject.

This article deals with the efficiency of open source for security. The authors state that trust of closed source also implies trust of compilers and getting rid of randomizing defences for buffer overflow. Some kinds of threats best realized by code reviews such as race conditions and backdoors are featured. The authors emphasize that the objective of commercial software is to produce upgrades and this may indirectly raise security issues.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Quality Requirements Annotated Bibliography, n.d.)
Security Quality Requirements Annotated Bibliography. Retrieved from https://studentshare.org/information-technology/1805021-annotated-bibliography
(Security Quality Requirements Annotated Bibliography)
Security Quality Requirements Annotated Bibliography. https://studentshare.org/information-technology/1805021-annotated-bibliography.
“Security Quality Requirements Annotated Bibliography”. https://studentshare.org/information-technology/1805021-annotated-bibliography.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Quality Requirements

Data Governance, Quality, Integration, and Security

...? Data Governance, Quality, Integration and Security Data Governance, Quality, Integration and Security Information that is in raw, unorganized or unprocessed form representing or referring to ideas, objects and conditions is known as data (Resnik & Yarowsky, 2000). Data, available universally and limitless in its nature, is the raw material in the information and communications technology world. This paper will review data management and information security practices of an organization. The policy change recommendations are aimed at improving quality of data, promoting efficient ways of sharing information, offering protection to sensitive data, managing information in its life cycle and availing trusted data critical to business...
4 Pages(1000 words)Essay

Thesis Requirements

...?Thesis Requirements This analyses is of a thesis, therefore there needs to be a ment regarding what the requirements are of a thesis, then determine if this particular paper meets all these stated requirements. First of, a thesis needs to have an introduction. An introduction will briefly state what the literature is surrounding the issue, what the research questions are, what the methodology is, and what the theoretical framework is for the overall thesis. A thesis also must have a literature review – a literature review will review the journals and books that give the background to the research questions which are presented, while opening up areas which need more study or questions which are not yet answered by previous studies...
10 Pages(2500 words)Essay

Discuss how security requirements can be linked to business requirements

...How Security Requirements can be linked to Business Requirements Word Count: 4489 Contents of the Report: IntroductionSecurity Management Security Management and Responsibilities Risk Mitigation Requirements: Administrative Policies. Effect of Security Requirements on Business Requirements. Summary of the Report. Introduction Information Technology is an evolution within an evolution. Information technology has set new trends in the generation of computers. This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology. There is a darker facet to this technology known as Information Security Risk. The Security Risks involved with the various information...
15 Pages(3750 words)Essay

Regulatory Requirements

... Regulatory Requirements Describe the FAA’s enforcement ity over unmanned aircraft FederalAviation Administration (FAA) is the body mandated with the authority to regulate all the civil aviation in the United States. This means that even the unmanned aircrafts fall under it. The FAA has enforced authority in the form of regulations to these types of aircrafts including them being used only in missions of public interest such as during disasters and even research in universities. The other is that they cannot fly beyond 50,000 feet from the ground and cannot go to airspace that are crowded or in major urban areas. Describe the current unmanned aircraft certification process In order for an individual to be allowed to fly the unmanned...
1 Pages(250 words)Essay

Physical security requirements

...Physical Security Requirements (Name of Institution) Introduction Constructing tall buildings for offices has become an inevitable part of current construction considerations. These buildings are exposed to several security risks; terrorism, emergencies, crimes and disorders among others. A 5-storey building is supposed to have elevators at the onset as a construction requirement to minimise movements up and down. Stairs, corridors, lobbies usually provide very fertile setting for crimes and danger to take place. Therefore, effective precaution must be taken during construction to minimise these risks. Security requirements Factors contributing to the problem are diverse; size of the building, anonymity inside the precincts...
3 Pages(750 words)Essay

Business requirements

Among the advances of technology, include the innovation of the micro processor which increased the amount of processed information as compared to the information that individuals and firms could have processed, internet innovation also led to availability of markets that are functional always whereby information could be passed at the appropriate time. On the other hand, changes in the communication sector makes businesses are allocated in areas where production costs are low but high profit margins. Advancements in the communication sector have led to creation on global markets since marketers effectively communicate with their consumers. Hence, the continuous innovation space in which recognized firms tend to thrive is shown by...
4 Pages(1000 words)Assignment

Integrating Security and Usability into the Requirements and Design Process

The user interface design of the touch screen register has features that enable it to attain security. First, the new system enforces access controls by requiring that every cashier supplies a matching pair of user-id and password in order to log in to the register. It is not only helpful in preventing non-legitimate access to the register, but also provides a good avenue to introduce role-based authentication. Moreover, it will be possible associating a given cashier with a certain workstation, and in certain instances, it is possible associating a cashier with a certain workgroup. Second, the registers ability to lock after four unsuccessful login attempts is a good strategy to suppress the efforts of brute force attackers and m...
8 Pages(2000 words)Research Paper

The Features and Requirements of Network Security

...As nowadays, the basic aim of installing network is based on a few factors which are mandatory to be operational for smooth transition and user satisfaction. In this scenario the hubs are installed which copy the data from one port to the other regardless the destination address. This way, significant amount of broadcast arises, resulting in choking and network congestion. REQUIREMENTS As per the field of digital forensics the network design client / server architecture will be adequate for meeting the requirements. The data will be stored on the server providing better security and centralized data protection. The security patches and antivirus definition files can be administer on the server. This will reduce the administrative work...
7 Pages(1750 words)Case Study

Supply Chains Ensuring Adequate Quality Requirements for McDonald's

The kitchen follows visual signs to take orders from the customer service desk which is placed right in front of the kitchen to enable quick response. The moment customer service executive sitting at the front desk receives an order, he transfers the information to the kitchen which is displayed on a video screen. The fresh bun is prepared in the new machine toasts within 11 seconds. This special toast which has the ability to prepare buns fast eliminates the need to keep buns beforehand and then heat them when the customer places an order. This causes the freshness of bun to reduce at two places. First, when the bun is kept in storage for long times waiting for the customer order and second when it is heated. Though McDonald&rsqu...
22 Pages(5500 words)Research Paper

Qualification Requirements of Security Personnel in the UK

... the objectives of this dissertation, I was greatly blessed with his extensive guidance and supervision over my work. I cannot complete this part without saying ‘thank you, sir’. Subsequent to that, my colleagues and friends who also played their part have extended their hand for my project; the successful culmination of this dissertation has also observed the role of my friends. For such contribution, I am also indebted to them. Abstract The main objective was to highlight the gap between the provided and the required level of training to the security personnel in the United Kingdom. In order to entertain the paper objectives, the author employed secondary research and highlighted the existing training and qualifications...
32 Pages(8000 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Annotated Bibliography on topic Security Quality Requirements for FREE!

Contact Us