Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Misuse and Abuse Cases: Getting Past the Positive
IEEE Security and Privacy
19 Deadly Sins of Software Security
19 Deadly Sins of Software Security
IEEE Security and Privacy
Compliance issues and IS degree programs
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
Mathematical and Computer Modelling: An International Journal
A graph based requirements clustering approach for component selection
Advances in Engineering Software
Hi-index | 0.00 |
The software development industry often brings in security at the eleventh hour, right before developers throw the code over the wall--that is, deploy it into production--and ask, "Well, is it secure?" At this point, hilarity--for the objective observers, anyhow--ensues as security personnel work feverishly to shove crypto, firewalls, and all the other mechanisms at their disposal into the most egregious risk areas. This article describes how to create useful misuse cases within the development process, thus avoiding the headaches that can arise toward the end of the cycle.