1 Introduction SEARCH-LAB Ltd.. 2 Introduction of SEARCH-LAB SEARCH Laboratory established at the Budapest University of Technology in 1999 SEARCH-LAB.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
1 sqa13b IEEE Standard for SQAP u IEEE Std –Standard for Software Quality Assurance Plans –12 pages u IEEE Guide for Software Quality Assurance.
ETS has been established in response to two major changes in the aviation industry. 1)The first is a major regulatory change - the inclusion of the industry.
Effective Design of Trusted Information Systems Luděk Novák,
Pertemuan 5-6 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Software life cycle processes Purpose n A new international standard (ISO/IEC 12207:1995(E) that –establishes a common framework for software life cycle.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
Software Quality Matters Ronan Fitzpatrick School of Computing Dublin Institute of Technology.
Security Governance Technology Executive Club
Chapter 13 Auditing Information Technology
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
0 Kluge Burch Zimmerling GRC Advisors Commodity Services Specification Penetration Testing & Application Security Assessment January 2015.
SEC835 Database and Web application security Information Security Architecture.
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
1. Topics to be discussed Introduction Objectives Testing Life Cycle Verification Vs Validation Testing Methodology Testing Levels 2.
MyOcean2 First Annual Meeting – April 2013 WP2.3 Service Engineering MyOcean2 First Annual Meeting – Cork /16-17 April 2013.
Information Systems Security Computer System Life Cycle Security.
Test Roles and Independence of Testing Telerik Software Academy Software Quality Assurance.
OASIS WSQM TC Meeting Dugki Min. 컴퓨터공학부 건국대학교 Agenda 1. Roll Call 2. Review and approval of the agenda 3. Review and approval of the previous.
Software Quality Assurance Lecture #2 By: Faraz Ahmed.
1 © Quality House QUALITY HOUSE The best testing partner in Bulgaria.
INFSO-RI ENG Exploitation Plan ETICS2 third AHM Isabel Matranga Engineering Ingegneria Informatica SpA Budapest, June 2009.
W. A D V I K. RU Introduction materials. W. A D V I K. RU Lines of activity General contracting; Telecommunication; Engineering; Security; Construction.
1 10/14/2015ã 2007, Spencer Rugaber The Waterfall Process Software plans and requirements Validation System feasibility Validation Product design Verification.
An Introduction to Software Engineering. What is Software?
Software Project Management With Usage of Metrics Candaş BOZKURT - Tekin MENTEŞ Delta Aerospace May 21, 2004.
Dependable ICT for Utilities Proposal for DESIRE activities The CRIS Institute Hans Ottosson The International.
Basic of Software Testing Presented by The Smartpath Information System An ISO 9001:2008 Certified Organization
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
How to audit the role of the vendor in the conduct of outsourced studies Kristel Van de Voorde Director Global Quality Regulatory Compliance Bristol-Myers.
KS3 Phase4 Client Server Monitoring System October 1, 2008 by Stephen, Seema, Kam, Shpetim.
Engineering Essential Characteristics Security Engineering Process Overview.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Database Administration
Introduction to Testing. Topics Who are we? Who are we? Software Testing Definition and Goals Software Testing Definition and Goals Facts and Numbers.
UNIT-1 SOFTWARE PRODUCT AND PROCESS: Introduction – S/W Engineering paradigm – Verification – Validation – Life cycle models – System engineering –
Quentis Scott IT Specialist - Section 508 Coordinator General Services Administration Office of the Chief Information Officer Washington, D.C. Developing.
MANUAL TESTING KS SESSION PRESENTED BY 26/11/015 VISHAL KUMAR.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
Software Testing and Software Quality Assurance Process.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Tuesday October 25, 2005 Preview SoBeNeT- II project.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE CHAPTER Types of Production Production Planning Planning.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Find the Best Software Companies in Toronto
Society for Maintenance and Reliability Professionals (SMRP)
Software Dependability
Software Quality Control and Quality Assurance: Introduction
Reliable Software Services Inc.
VeriTrust Verified Trusted Computing
BIS 221 RANK Education for Service-- bis221rank.com.
Unit 4 Project Design, implementation and evaluation
برنامج التميز في خدمة عملاء السادة موظفي مكاتب المساعدة القانونية
ME 123 Computer Applications I
Energy-Efficient Storage Systems
BIS 221 Great Wisdom/tutorialrank.com. BIS 221 All Assignments For more course tutorials visit BIS 221 Week 2 Assignment Business.
CS385T Software Engineering Dr.Doaa Sami
Albeado - Enabling Smart Energy
Evoluon Congress Center Helmond Automotive Campus
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

1 Introduction SEARCH-LAB Ltd.

2 Introduction of SEARCH-LAB SEARCH Laboratory established at the Budapest University of Technology in 1999 SEARCH-LAB Ltd established in 2002 as a spin-off company to provide professional services in the area of product security MEFORMA Methodology for Manual Security Audit FLINDER Automated Security Testing Embedded Systems Security Evaluation Continuous Attack Technology Watch Secure coding trainings

ANIKETOS: Secure and Trustworthy Composite Services SecFutur: Design of Secure and energy- efficient embedded systems for Future Internet applications uTRUSTit: Usable TRUST in the Internet of Things SHIELDS: Detecting known security vulnerabilities from within design and development tools OPENTC: Open Trusted Computing SAFECode: Software Assurance Forum for Excellence in Code 3 Research projects and professional activities

4 Research partners

Roles in the project In general: security evaluation laboratory SPD (Security Privacy Dependability) Expectations Novel tools and methods for automated security evaluation of embedded systems / new application areas Major tasks according to the project plan Requirements, specification and metrics (WP2) Denial-of-service (T3.4) Cryptographic technologies (T3.5) Monitoring and reacting (T5.5) Integration, validation and verification (WP6 & WP7) 5