Software vulnerability analysis
Software vulnerability analysis
Where security education is lacking
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Software Security: Building Security In
Software Security: Building Security In
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Creating a Computer Security Curriculum in a Software Engineering Program
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Software security engineering: a guide for project managers
Software security engineering: a guide for project managers
Network security in two-year colleges
Journal of Computing Sciences in Colleges
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
The role of cyber-security in information technology education
Proceedings of the 2011 conference on Information technology education
Using a real world project in a software testing course
Proceedings of the 45th ACM technical symposium on Computer science education
Hi-index | 0.00 |
Software security is a tough reality that affects the many facets of our modern, digital world. The pressure to produce secure software is felt particularly strongly by software engineers. Todays software engineering students will need to deal with software security in their profession. However, these students will also not be security experts, rather, they need to balance security concerns with the myriad of other draws of their attention, such as reliability, performance, and delivering the product on-time and on-budget. At the Department of Software Engineering at the Rochester Institute of Technology, we developed a course called Engineering Secure Software, designed for applying security principles to each stage of the software development lifecycle. As a part of this course, we developed a component called Vulnerability of the Day, which is a set of selected example software vulnerabilities. We selected these vulnerabilities to be simple, demonstrable, and relevant so that the vulnerability could be demonstrated in the first 10 minutes of each class session. For each vulnerability demonstration, we provide historical examples, realistic scenarios, and mitigations. With student reaction being overwhelmingly positive, we have created an open source project for our Vulnerabilities of the Day, and have defined guiding principles for developing and contributing effective examples.