Better Software Conference 2006 Conference Proceedings 

Home


GENERAL INFO.

Register

Get a Brochure


PRESENTATIONS

Keynotes

Tutorials

Concurrent

Master Schedule


IN THE EXPO

Sponsors

Exhibitors

To Exhibit


MORE INFO.

SQE Home

Other Conferences


Email Software Quality EngineeringRegister Now

Software Quality Engineering



            
Better Software Conference & EXPO 2006 Concurrent Sessions

Go To:  Agile Development  |  Managing Projects and Teams  |  Measurement  |  Outsourcing  |  Plan-Driven Development  |  
Process Improvement  |  Quality Assurance  |  Security  |  Special Topics  |  System Requirements  |  Testing


View by Date

 Security
W4
Wednesday, June 28, 2006 11:30 AM
Operational Security in Software Development
Carol Woody, Software Engineering Institute

Research conducted by CERT, the computer security incident response team based at the Software Engineering Institute (SEI), indicates that writing quality coding is not enough to ensure system security. Operating platforms, supported user devices, interface designs, linkages with legacy systems, source code management, data exchange protocols, and controls for authentication data among system modules all impact operational security. Incomplete security requirements and poorly planned implementations further contribute to security risk. Using both research and a follow-up case study, Carol Woody describes the things you can do in your development and test organizations to improve operational security. She introduces an analysis technique for evaluating operational risks within the development process and offers guidelines for clearly defining testable security requirements. Discover an approach to coordinate security risks among stakeholders to reduce and possibly eliminate high impact operational security failures.

� The attributes of good operational security
• Incorporate verifiable security requirements into software development
• Steps for a security risk analysis of your current and future systems
W10
Wednesday, June 28, 2006 1:45 PM
Building Secure Software with New Web Technologies
Ivan Krstic, Harvard University

The latest generation of Web technologies�AJAX, improved client-side scripting, support for extensive DOM manipulation in browsers, content syndication, Web service APIs, and simple interchange formats such as JSON�are all driving new, powerful Web applications. Based on his work on real world �Web 2.0� applications, Ivan Krstic discusses the security implications of these new technologies. Ivan describes specific attacks such as Web-based worms, XSS, CSRF, and HTTP response splitting and offers advice on mitigating security risks during the engineering process. Learn how standard security guidelines such as The Confidentiality-Integrity-Availability (CIA) model apply to the modern Web and about the role of cryptography and crypto-engineering in Web security. Take back concrete recommendations for security specifications during initial software design, guidelines for implementation, and security tracking requirements after deployment.

� New Web technologies that fuel new security threats
• The most successful security strategy for developers
• Harden software from attacks at each stage of development
W16
Wednesday, June 28, 2006 3:00 PM
Integrating Security into the Development Lifecycle
Ryan English, SPI Dynamics Inc

Software security is neither a development problem nor an IT operations problem. Rather, it is a paramount business problem requiring a multidisciplinary approach that minimizes organizational risk when delivering software products. By making a program-level commitment to security, IT organizations will be in the best position to defend their businesses from growing threats. Ryan English explores business management and the process components of defining, designing, instituting, and verifying secure development practices. He describes a broad set of principles that leading companies are adopting to improve the security of their software and outlines an application security program your company can implement. This approach requires a commitment to application security at all levels of management and offers the promise of a mature level of security without undue effect on the overall development process and delivery schedules.

� Standards, processes, tools, and educational needs for delivering secure systems
• Examples of clear, concise development standards for secure software
• How to create an Application Security Assurance Program (ASAP)



Better Software Conference & EXPO 2006 is a Software Quality Engineering Production

The Current Conference   |   StickyMinds.com   |   Better Software magazine

Software Quality Engineering   •   330 Corporate Way, Suite 300   •   Orange Park, FL 32073

Phone: 904-278-0524   •   Toll Free: 800-423-8378   •   Fax: 904-278-4380   •   Email: [email protected]

© 2006 Software Quality Engineering. All rights reserved.