Secure Web Based System Development: Oluleke Bamodu Benson Otafu
Secure Web Based System Development: Oluleke Bamodu Benson Otafu
Oluleke Bamodu
Benson Otafu
I.
INTRODUCTION
TABLE I.
ESSENTIAL SKILLS
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
TABLE II.
Cryptography
encryption
Network security
Database management
and
Boehm Lifecycle
Boehm
lifecycle is
based on waterfall and
iterative
design
methodologies
which
are matured system
models.
Building of prototypes
and simulation can be
achieved easily with the
model and can help with
minimizing cost and risk
[8].
Effective
for
management.
Effective
for
management.
Shorter
development
cycle, considered as a
security life cycle model
[8].
Prototype development
time cycle for original
Boehm lifecycle model
is known to be two year
which would make it
unsuitable
for
fast
moving developments
required in a secure web
based
system
development [11, 12].
risk
risk
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
IV.
10
5
0
TABLE IV.
Whether or not
the threat can
be reproduced.
10
5
0
10
5
0
REPRODUCIBILITY TABLE
TABLE V.
Tools and skills
needed
for
performing the
threat..
EXPLOITABILITY TABLE
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
TABLE VI.
Number
of
users affected
by the threat.
10
5
0
10
5
0
ACKNOWLEDGMENT
All users.
Some users.
None.
TABLE VII.
Ease
of
discovering the
threat.
DISCOVERABILITY TABLE
REFERENCES
[1]
[2]
[3]
[4]
[6]
[7]
Description
Attacker obtains sensitive
information from database
through
internet
with
blocked firewall port
Attacker obtains sensitive
information from database
through internet with open
firewall port.
[5]
Risk
Rating
10
10
Low
10
10
10
High
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Wikipedia:
Software
Development.
Available
at
http://en.wikipedia.org/wiki/Software_development
B. Vandegriend, The core skills all software developers need 2009.
Available at http://www.basilv.com/psd/blog/2009/the-core-skillsall-software-developers-need
T. Olzak, "A practical approach to threat modeling," March 2006.
Available at http://http://www.adventuresinsecurity.com
M. Howard, and D. LeBlanc, Writing Secure Code, 2nd ed.,
Microsoft Press: Washington, 2003,pp.3-124
Wikipedia:
Cryptography.
Available
at
http://en.wikipedia.org/wiki/Cryptography
K. Zotos, and A. Litke, "Cryptography and Encryption". Available at
http://arxiv.org/ftp/math/papers/0510/0510057.pdf
Wikipedia:
Waterfall
Model.
Available
at
http://en.wikipedia.org/wiki/Waterfall_model
A Comparison of Three Life Cycle Models. Available at
http://homepages.feis.herts.ac.uk/~comqjs1/A_Comparison_of_Three
_LCMs.pdf
Wikipedia:
Spiral
Model.
Available
at
http://en.wikipedia.org/wiki/Spiral_model
C. Larman, and V. R. Basili, "Iterative and Incremental Development:
A Brief History," IEEE Computer (IEEE Computer Society) , Vol
36(6),pp.4756, Jun. 2003, doi:10.1109/MC.2003.1204375.
B. W. Boehm, "A spiral model of software development and
enhancement," IEEE Computer , vol.21, no.5, pp.61-72, May 1988
doi: 10.1109/2.59
H. Peter, "Interpreting the Spiral Model of Software Intensive
System Development - A ULCM Approach,". Available at
http://sse.stevens.edu/fileadmin/cser/2006/papers/120-HantosSpiral%20Model%20ULCM.pdf
Microsoft Security Development Lifecycle. Available at
http://www.microsoft.com/security/sdl/default.aspx
MSDN
Magazine:
Threat
Modeling.
Available
at
http://msdn.microsoft.com/en-us/magazine/cc163519.aspx