Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3340338
|View full text |Cite
|
Sign up to set email alerts
|

Managing Security in Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…Technological: It is acknowledged that different artefact types can be the source to incur technical debt [20], and security debt is not an exception [5]- [7], [12], [13]. Different categories can be found in the literature such as requirements [7], code [7], [12], [13], design and architecture [7], [12], [13], configuration [13], environment [12], hardware and physical parts [6], cloud computing infrastructure [13], knowledge distribution [12], documentation [12], [13], and testing [7], [12], [13]. Section V will later present concrete categories and examples of security debt items.…”
Section: B Characteristicsmentioning
confidence: 99%
See 4 more Smart Citations
“…Technological: It is acknowledged that different artefact types can be the source to incur technical debt [20], and security debt is not an exception [5]- [7], [12], [13]. Different categories can be found in the literature such as requirements [7], code [7], [12], [13], design and architecture [7], [12], [13], configuration [13], environment [12], hardware and physical parts [6], cloud computing infrastructure [13], knowledge distribution [12], documentation [12], [13], and testing [7], [12], [13]. Section V will later present concrete categories and examples of security debt items.…”
Section: B Characteristicsmentioning
confidence: 99%
“…One characteristic that we can highlight from security debt is that it is highly related to security risks. Some authors refer security debt as technical debt containing a security risk [7] or potential security implications [8]. Security engineering techniques (e.g., risk analysis) are used to identify the security debt [6], [8] and security risk in software can be described [7], [11] Technical debt can be a source of security debt [1], [3], [8] Tradeoffs of security and other quality attributes (e.g., performance) might force to assume security debt [5], [14] Organizational Organization policies should prioritize security debt [12], [19] Security awareness and skills are needed to avoid security debt [8], [13] Security debt involves different stakeholders requiring discussions and decision making among them [5], [14] Consequences Business damage: High interest of the debt [8], [9], [12], [14], [16], [21] Interest will be paid mainly when someone exploit the vulnerability [8], [9], [16], [21] Paying the principal of the security debt might require to change processes [16], [19] in terms of technical debt [8], e.g., including the probability attribute to the security debt item to measure the chances that the security-related defect can be actually exploited [5].…”
Section: B Characteristicsmentioning
confidence: 99%
See 3 more Smart Citations