2007
DOI: 10.1002/bltj.20247
|View full text |Cite
|
Sign up to set email alerts
|

Building secure products and solutions

Abstract: Many security vulnerabilities in current information technology (IT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Our aim is to design the necessary building blocks for a decision aid system that will help administrators and decision makers in their day‐to‐day battle against attackers. We clearly believe that dynamic risk management can be an enabler in the process of designing an information security management system (ISMS) with standard risk management methodologies, such as the Bell Labs Security Framework [10] and International Organization for Standardization (ISO)/International Engineering Consortium (IEC) 27000 series [14]. By focusing on the success likelihood factor in this paper, our work represents a first step towards dynamic risk management for proactive and reactive security.…”
Section: Resultsmentioning
confidence: 99%
“…Our aim is to design the necessary building blocks for a decision aid system that will help administrators and decision makers in their day‐to‐day battle against attackers. We clearly believe that dynamic risk management can be an enabler in the process of designing an information security management system (ISMS) with standard risk management methodologies, such as the Bell Labs Security Framework [10] and International Organization for Standardization (ISO)/International Engineering Consortium (IEC) 27000 series [14]. By focusing on the success likelihood factor in this paper, our work represents a first step towards dynamic risk management for proactive and reactive security.…”
Section: Resultsmentioning
confidence: 99%
“…We have distributed and used these practices to build our assessment framework, which is presented in the next section. [3], [15], [16], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [42], [61], [62], [63], [64], [ Use a scheme to classify applications based on data confidentiality 3 [42], [60], [65] 6 Perform design and architecture security risk analysis 15 [58], [61], [65] , [66], [67], [68], [69], [70], [50], [71], [72], [73], [74], [75] 7…”
Section: B Secure Software Design Practicesmentioning
confidence: 99%
“…[56], [54], [67], [74], [76] 8 Security specification review 2 [67], [71] 9 Minimize software attack surface or access points 8 [3], [15], [45], [49], [57], [70], [75] 10 Identify and segregate trusted entities from untrusted entities 8 [3], [46], [55], [58], [67], [70], [71], [77] 11 18 Design security features using diagrams 2 [67], [68] 19 Consider security principles in design 14 [5], [16], [45], [49], [55], [56], [57], [61], [62], [65], [70], [72], [74], [79] 20 Minimize or eliminate unnecessary functionality 3 [67], [71], [ [16], [42], [49], [56], [64], [73], [77], [80]…”
Section: B Secure Software Design Practicesmentioning
confidence: 99%
“…E-prescribing takes advantage of technical services, such as databases, local area networks, wide area networks, the Internet, and many technical standards to allow communication between systems. "Security is a continuous, living process for ensuring that people, networks, and information have the necessary protection required by businesses for secure, reliable day-to-day operations" ( Gupta, 2007).…”
Section: Security Concernsmentioning
confidence: 99%