We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJolie Emens
Modified over 2 years ago
© 2012 Carnegie Mellon University Panel: Growing the Skills Required for Trustworthy Software Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. Date 12/5/12
2 © 2012 Carnegie Mellon University Who Needs Training & Education Builders Designers Engineers Coders Testers Decision Makers Program Management Stakeholders Executives Acquirers
3 © 2012 Carnegie Mellon University Software Assurance (SwA) Curriculum Project
4 © 2012 Carnegie Mellon University SwA Curriculum Sponsorship and Goals Sponsored by the Department of Homeland Security (DHS) National Cyber Security Division (NCSD) Goals develop software assurance curricula define transition strategies for future implementation
5 © 2012 Carnegie Mellon University SwA Curriculum Project Objectives Improve the state of software assurance education Develop a Master of Software Assurance Reference Curriculum (Volume I) Identify educational offerings at other levels Undergraduate (Volume II) MSwA Syllabi (Volume III) Community College (Volume IV) Integration with IS Curricula (Technical Note)
6 © 2012 Carnegie Mellon University Purpose of MSwA Curriculum Foundational material includes (but not limited to) Software Assurance Curriculum Body of Knowledge (SwACBK) work done by the SEI in support of DHS Build Security In (BSI) website Graduate Software Engineering 2009 (GSwE 2009) Curriculum Guidelines for Graduate Degree Programs in Software Engineering VOLUME I
7 © 2012 Carnegie Mellon University Body of Knowledge (BoK) Organization: BoK knowledge areas knowledge units knowledge topics, with associated Bloom cognitive levels Assurance Process and Management Assurance Across Life Cycles Risk Management Assurance Assessment Assurance Management Assurance Product and Technology System Security Assurance Assured Software Analytics System Operational Assurance
8 © 2012 Carnegie Mellon University Architectural Structure of an MSwA2010 Degree Program Preparatory Materials Computing Foundations Software Engineering Security Engineering MSwA Core Assurance Across Life Cycles Risk Management Assurance Assessment Assurance Management System Security Assurance Assured Software Analytics System Operational Assurance Electives Courses Related to Assurance in Selected Domains Capstone ExperienceProject
9 © 2012 Carnegie Mellon University Outcomes of MSwA Curriculum Work Outcomes specify the knowledge, skills, and capabilities that graduates of an MSwA program can expect when they complete the program represent the minimum capabilities that should be expected of professionals in the area of software assurance when they complete a masters degree program provide a model for curriculum content, organization, expected curriculum outcomes support those who assess software assurance programs
10 © 2012 Carnegie Mellon University Professional Society Recognition IEEE Recognition The MSwA curriculum was recognized by the IEEE Computer Society. Its notification follows: At the meeting of the IEEE Computer Society Board of Governors it was passed: MOVED, that the IEEE Computer Society Board of Governors recognizes the SEI CMU/SEI-2010-TR-005 Reference Curriculum as appropriate for a Masters Program in Software Assurance for a period of 5 years beginning in 1 August 2010. Statement: The curriculum recommendation could contain a statement similar to The IEEE Computer Society recognizes this curriculum recommendation as appropriate for a Masters Program in Software Assurance, signifying that the Society considers it suitable for its stated purpose. If the curriculum recommendation is appropriate as a model for similar efforts, the statement should indicate that designation. IEEE published an article about its recognition of the MSwA curriculum at http://www.computer.org/portal/web/pressroom/20101213MSWA. http://www.computer.org/portal/web/pressroom/20101213MSWA ACM Recognition The MSwA curriculum was also recognized by the Association for Computing Machinery (ACM) Education Board. This is identical to the IEEE recognition.
11 © 2012 Carnegie Mellon University SwA Undergraduate Course Outlines Background Corollary activity to MSwA curriculum development. Course outlines include description, prerequisites, syllabus (list of topics and Blooms levels), course delivery features, suggestions on assessment, references. Background sources include SwACBK, MSwA Curriculum (Volume I). Other sources include the following: CS2008 outlines Carnegie Mellon University outlines James Madison University outlines University of California, Davis outlines Purdue University outlines VOLUME II
12 © 2012 Carnegie Mellon University SwA Undergraduate Courses Computer Science I (with SwA emphasis) Computer Science II (with SwA emphasis) Introduction to Computer Security Software Security Engineering Secure Programming Special Topics in Information Assurance and Security Software Quality Assurance Software Assurance Analytics Software Assurance Capstone Project
13 © 2012 Carnegie Mellon University MSwA Course Syllabi Supports the development of a set of courses to be used in a master of software assurance curriculum. Available at http://www.cert.org/mswa/ VOLUME III
14 © 2012 Carnegie Mellon University Community College Report An ACM committee on two-year degree programs, led by Elizabeth Hawthorne, partnered with the SEI team. The report includes discussion of existing curricula related to software security that are suitable for community colleges target audience course outlines identification of resources VOLUME IV
15 © 2012 Carnegie Mellon University Community College Courses Target audience: Students planning to transfer to a four- year program, students with prior undergraduate technical degrees who wish to become more specialized in software assurance Courses: Computer Science I, II, and III Introduction to Computer Security Secure Coding Introduction to Assured Software Engineering
16 © 2012 Carnegie Mellon University Executive Overview of Software Assurance
17 © 2012 Carnegie Mellon University Executive Course Description Audience: PEOs, procurement officers, and others involved in software acquisition. Goal: Prepare executives to make informed decisions when acquiring or overseeing development of a security-critical software system Contents: Wide spectrum of pertinent issues to helps executives and managers understand and address decisions related to security impacts.
18 © 2012 Carnegie Mellon University Course Content Summary Software Assurance in Acquisition Assurance Management Software Security Fundamentals Security in Detail Software Assurance Risk Management Conclusion
19 © 2012 Carnegie Mellon University Software Assurance in Acquisition Why Is this Important? Risks and Threats Critical System Compromises and Failures Concepts of Confidentiality, Integrity, Availability, and Authentication Principles of Software Assurance In-House Versus Acquired Pros and Cons Cloud Component Considerations System Evolution Upgrades Activity: Discuss case studies and examples showing issues related to upgrading systems. Emphasize emergent behaviors, compliance to policies, etc.
20 © 2012 Carnegie Mellon University Assurance Management Ownership Issues Own It, Rent It; Build vs. Buy What Is Cloud? Is Cloud Suitable for You? Assurance Management Making a Business Case for Assurance Compliance with Laws, Regulations, Standards, Policies and Best Practices Case Studies Decision Making Strategies Activity: Use examples of software as service and present cost-benefit analyses in relation to risks associated with hosting the applications versus outsourcing them. Use case studies to have managers identify the areas of their business in which they could use Cloud services. Activity: Make the business case for assurance using ROI, risk analysis, etc. Use case studies to show how assurance practices can be integrated into regular acquisition activities. Present decision making strategies to satisfy the constraints the projects have to meet, including meeting standards and regulations.
21 © 2012 Carnegie Mellon University Software Security Fundamentals 1 Life-Cycle Models Traditional Models, Such as Waterfall Newer Models, Such as Agile and Iterative Development Security and Software Assurance Aspects of Software Development Activities Software Requirements Engineering Software Architecture and Design Methods and Standards Software Coding Methods and Standards Testing Methods and Standards Maintenance, Operation, and Retirement Techiques/Strategies Activity: Present some examples that show the fragile nature of software and the impracticality of having fault-free software. The failure of Ariane 5s first test flight and the loss of the Mars Climate Orbiter are well documented cases.
22 © 2012 Carnegie Mellon University Software Security Fundamentals 2 Basic Concepts of Security Confidentiality (C) Integrity (I) Availability (A) Balancing the C–I–A Triangle Authentication Principles (Saltzer & Schroeder vs. Software Assurance Principles Work) Activity: Engage students in discussion. How will they address these basic concepts in their acquisition? Especially, how will they balance the CIA triangle. (It may be helpful to point out the relationship between availability and reliability.) When would multiple mechanisms for authentication be advisable?
23 © 2012 Carnegie Mellon University Security in Detail 1 Threats and Attack Vectors Assets Resources Vulnerability of the Organization as a Result of the Threat Attack Scenarios Security Policy and Its Importance Access Control and Accountability Awareness of Applicable Policies and Standards Security from an ROI Perspective Business Case Hard Business Decisions Security Supply Chain What Is It? How to Build Security into the Supply Chain Activity: Use examples and case studies to emphasize the classification of assets and how to identify which ones would be more likely to be attacked. Provide examples of insider threats. This section will prepare users for compartmentalizing risks. Activity: Expand on examples that an acquirer or those who oversee development should consider.
24 © 2012 Carnegie Mellon University Security in Detail 2 Security from an ROI Perspective Business Case Hard Business Decisions Security Supply Chain What Is It? How to Build Security into the Supply Chain Linkage to the Supply Chain Course Activity: Use case studies to show the impact of security-related technologies; include examples of compromised critical infrastructure. Activity: Provide examples of how they would address the security supply chain as acquirers or as those overseeing development.
25 © 2012 Carnegie Mellon University Software Assurance Risk Management Risk Management Concepts Risk Management Process Standards, Regulations, and Best Practices Government and Industry-Specific Standards Documented Organizational Policies and Their Importance Activity: Survey the concepts of risk management and process. Emphasize the existence of organizational policies that help to mitigate risks.
26 © 2012 Carnegie Mellon University Conclusion Importance of Software Assurance for Acquirers Build/Buy Decision Business Case Supply Chain Risk Management Software Assurance Risk Management The Way Forward
27 © 2012 Carnegie Mellon University Supply Chain Risk Management
28 © 2012 Carnegie Mellon University Supply Chain Risk Management (SCRM) SCRM for ICT acquisitions considers two kinds of malicious actions. Malicious supply chain events: counterfeits & tampering Malicious system events: a system weakness provides access to sensitive information, reduces the availability of an essential service, or affects data integrity. Introductory Course available on FEDVTE September 2012 SCRM Awareness Course under development Sponsored by the Department of Homeland Security (DHS) National Cyber Security Division (NCSD)
29 © 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material is based upon work supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS- IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and No Warranty statements are included with all reproductions and derivative works. External use:* This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at firstname.lastname@example.org@sei.cmu.edu *These restrictions do not apply to U.S. government entities.
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
1 Model Testing © 2015 Carnegie Mellon University Model Testing: Testing Executable Requirements, Architecture, and Design Models Software Engineering.
Additional Assurance Services: Other Information Chapter 20 McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2013 Carnegie Mellon University UFO: From Underapproximations to Overapproximations and Back! Arie Gurfinkel (SEI/CMU) with Aws Albarghouthi and Marsha.
© 2008 Oracle Corporation – Proprietary and Confidential.
Carnegie Mellon University Software Engineering Institute CERT® Knowledgebase Copyright © 1997 Carnegie Mellon University VU#14202 UNIX rlogin with stack.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
© 2013 Carnegie Mellon University The Software Assurance Competency Model: A Roadmap to Enhance Personal Professional Capability Software Engineering Institute.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 12-1 MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 12 PLANNING INFORMATION.
© 2011 Carnegie Mellon University System of Systems V&V John B. Goodenough October 19, 2011.
Copyright © 2014 ASTQB Presented by Rex Black, CTAL Introducing ISTQB Agile Foundation Extending the ISTQB Program’s Support Further.
GENERAL EDUCATION ASSESSMENT Nathan Lindsay January 22-23,
The Center for IDEA Early Childhood Data Systems Improving Data, Improving Outcomes Conference, September 2014 Digging into “Data Use” Using the DaSy Framework.
Ipek Ozkaya, COCOMO Forum © 2012 Carnegie Mellon University Affordability and the Value of Architecting Ipek Ozkaya Research, Technology.
Chapter 7-1. Chapter 7-2 Chapter 7 Accounting Information Systems Accounting Principles, Ninth Edition.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Chapter 6 Requirements Engineering Process.
Overview of the Rose-Hulman Bachelor of Science in Software Engineering Don Bagert SE Faculty Retreat – New Faculty Tutorial August 23, 2005.
Revision N° 13ICAO Safety Management Systems (SMS) Course06/05/09 Module N° 7 – Introduction to SMS.
© Carnegie Mellon University The CERT Insider Threat Center.
TQA FOR EDUCATION 1 TQA CONCEPTS & CORE VALUES. TQA FOR EDUCATION 2 What TQA? l Are the foundation of the National Quality Program l Define performance.
National Center on Response to Intervention RTI Implementer Webinar Series: Establishing a Screening Process 1.
Chapter 5 Transfer of Training Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
14% of the exam 24 questions 1 Carol Pattyn 6/18/13.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
Chapter 9- slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Nine New-Product Development and Product Life-Cycle Strategies.
NIMS ICS All-Hazard Position Specific Training – A Way Forward A Special Presentation for the All Hazards IMT Conference Houston, Texas November 4 – 6,
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Directions for this Template Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
Project Management Education at Columbia Basin College For-Credit & Continuing Education AACE International - 4/17/20121.
Membership & Roster Maintenance Officers Training Workshop September 2012 Kevin Shanahan 1.
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
2 Session Objectives The objectives are: To demonstrate the need for internal controls To explain the components of internal controls To review examples.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
The importance of the service catalogue to the service desk Colin Rudd, Chairman, itSMF UK Andrew Navin, ServiceDesk Consultant, ManageEngine.
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Basic Concepts Key Learning Points : The objectives of this chapter are as follows: To provide an introduction to the basic Concepts of enterprise architectures,
The Guide to the Software Engineering Body of Knowledge SWEBOK.
Chapter 8 - slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Eight Products, Services, and Brands Building Customer.
1 © 2009 University of Wisconsin-Extension, Cooperative Extension, Program Development and Evaluation Human Subjects Protection (HSP)
Chapter 1- slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter One Creating and Capturing Customer Value.
Visual 2.1 Leadership & Management Unit 2: Leadership & Management.
Nick Coblentz OWASP CLASP Overview.
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
E- Learning Technologies: Applications for Government Accounting & Financial Systems Page - 1 January 19, 2004 International Institute of Business Technologies.
1 Core Curriculum for Clinical Coaching Intro - VNIP Model Vermont Nurses In Partnership Susan A. Boyer, RN, M.Ed. © Vermont Nurses In Partnership,
Security Controls – What Works Southside Virginia Community College: Security Awareness.
ASTM International Officers Training Workshop September 2012 Pat Picariello, Director, Developmental Operations 1 Strategic Planning & New Activity Development.
© 2017 SlidePlayer.com Inc. All rights reserved.