IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Software Education: A Contextual Model-Based Approach

Secure Software Education: A Contextual Model-Based Approach
View Sample PDF
Author(s): J. J. Simpson (System Concepts, LLC, USA), M. J. Simpson (System Concepts, LLC, USA), B. Endicott-Popovsky (University of Washington,USA)and V. Popovsky (University of Idaho,USA)
Copyright: 2012
Pages: 27
Source title: Security-Aware Systems Applications and Software Development Methods
Source Author(s)/Editor(s): Khaled M. Khan (Qatar University, Qatar)
DOI: 10.4018/978-1-4666-1580-9.ch016

Purchase

View Secure Software Education: A Contextual Model-Based Approach on the publisher's website for pricing and purchasing information.

Abstract

This article establishes a context for secure information systems development as well as a set of models used to develop and apply a secure software production pedagogy. A generic system model is presented to support the system context development, and to provide a framework for discussing security relationships that exist between and among information systems and their applications. An asset protection model is tailored to provide a conceptual ontology for secure information system topics, and a stable logical framework that is independent of specific organizations, technologies, and their associated changes. This asset protection model provides a unique focus for each of the three primary professional communities associated with the development and operation of secure information systems. In this paper, a secure adaptive response model is discussed to provide an analytical tool to assess risk associated with the development and deployment of secure information systems, and to use as a security metric. A pedagogical model for information assurance curriculum development is then established in the context and terms of the developed secure information system models. The relevance of secure coding techniques to the production of secure systems, architectures, and organizational operations is also discussed.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom