Secure Software Development of Cyber-Physical and IoT Systems

Author(s):  
Muthu Ramachandran

This real-world case study has been used to demonstrate the best practices on business process modelling and component based design for developing cloud services with Build Security In (BSI). BSI techniques, strategies, and processes presented in this article are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.

Author(s):  
Muthu Ramachandran

This real-world case study has been used to demonstrate the best practices on business process modelling and component-based design for developing cloud services with build security in (BSI). BSI techniques, strategies, and processes presented in this chapter are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.


Author(s):  
Lisa J. Burnell ◽  
John W. Priest ◽  
John R. Durrett

An effective knowledge-based organization is one that correctly captures, shares, applies and maintains its knowledge resources to achieve its goals. Knowledge Management Systems (KMS) enable such resources and business processes to be automated and are especially important for environments with dynamic and complex domains. This chapter discusses the appropriate tools, methods, architectural issues and development processes for KMS, including the application of Organizational Theory, knowledge-representation methods and agent architectures. Details for systems development of KMS are provided and illustrated with a case study from the domain of university advising.


2011 ◽  
pp. 571-592
Author(s):  
Lisa J. Burnell ◽  
John W. Priest ◽  
John R. Durrett

An effective knowledge-based organization is one that correctly captures, shares, applies and maintains its knowledge resources to achieve its goals. Knowledge Management Systems (KMS) enable such resources and business processes to be automated and are especially important for environments with dynamic and complex domains. This chapter discusses the appropriate tools, methods, architectural issues and development processes for KMS, including the application of Organizational Theory, knowledge-representation methods and agent architectures. Details for systems development of KMS are provided and illustrated with a case study from the domain of university advising.


Author(s):  
Ann McCready ◽  
Andrew Doswell

This case study, about the introduction of networked PCs in a local government office in Perth, Scotland, focuses on the importance of organizational and social factors during the implementation process. The implementation of the network in this case study is not a straightforward progression from one stage to the other, as may be inferred from the systems development life cycle “waterfall” model but a circular, stop-and-start process with moves back to previous stages and is more like a “spiral” approach of dynamic and unfolding processes. The case study highlights the links between technical and nontechnical aspects of implementation and the complicated process of project management in which a balance is continually being sought between technical and nontechnical issues. But although social processes may reduce technical as well as social problems, not all problems can be solved by attention to social factors. Organizational constraints may limit the success of the implementation process, and there are also dangers in including users who, if their views are disregarded, may become disillusioned and adversely affect future development of the network.


2020 ◽  
Vol 10 (2) ◽  
pp. 82-92
Author(s):  
Dina Fitria Murad ◽  
Daffa Fauzan Basukiputra ◽  
Michael Hendra Wijaya ◽  
M Iqbal Fauzi

The purpose of this study was to develop a learning model by utilizing chatbot technology that was integrated with LINE's chat media for the Indonesian C-based PKBM package C program. The learning model that was built functioned as a support system for learning media to independently learn access to learning materials, discussion and work on the questions and discussion of National Examination exercises distributed from a content management system (CMS) through a program. The research method is composed using the Systems Development Life Cycle (SDLC). The analysis is done by identifying the problems of the learning system business processes that are running. The results of this study are chatbot-based learning models that are integrated with the LINE chat application which contains the distribution of material, practice questions, discussion to an evaluation of student learning that will help the teaching and learning system in Indonesian-powered PKBM.


Author(s):  
Ann McCready ◽  
Andrew Doswell

This case study, about the introduction of networked PCs in a local government office in Perth, Scotland, focuses on the importance of organizational and social factors during the implementation process. The implementation of the network in this case study is not a straightforward progression from one stage to the other, as may be inferred from the systems development life cycle waterfall model but a circular, stop-andstart process with moves back to previous stages and is more like a spiral approach of dynamic and unfolding processes. The case study highlights the links between technical and nontechnical aspects of implementation and the complicated process of project management in which a balance is continually being sought between technical and nontechnical issues. But although social processes may reduce technical as well as social problems, not all problems can be solved by attention to social factors. Organizational constraints may limit the success of the implementation process, and there are also dangers in including users who, if their views are disregarded, may become disillusioned and adversely affect future development of the network.


2020 ◽  
Vol 4 (1) ◽  
pp. 39-48
Author(s):  
Yulia Rosa ◽  
Marsellinus Bachtiar Wahju

The progress of time continually accompanied by the development of technology. It leads to the competition among industries that require them to have superiority to attract more consumers. X Fashion is one of the fashion industries which sells various apparel products for people in the sale of large or small scale. The business processes of X Fashion is procuring products, managing inventory, sales, and managing finance. A lot of variations and number of products in the store are not in balance with a good management because all forms of recording are done manually. It causes potential error so that the information disseminated is inaccurate. Based on this consideration, a research is conducted as inventory and sales information system design on X Fashion clothing store to identify business process also to design an inventory and sales information system on X Fashion clothing store. The method used is Systems Development Life Cycle which consists of systematic steps for developing, designing, and maintaining the system to meet the needs of users, including supervision, recording, and reporting. Information system is designed to provide stock data, expense, and income reports automatically. Testing of the system includes system testing, function testing, learnability, logic testing, memorability, and measurement of satisfaction. Based on the test results, the information system was stated feasible and can be used to support business processes on X Fashion clothing store. Suggestions for further research on information system design are development of system design in order to be compatible on smartphone, also an addition of brief information on every control or using user guide in order to describe system function


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 46668-46682 ◽  
Author(s):  
Martin Span ◽  
Logan O. Mailloux ◽  
Robert F. Mills ◽  
William Young

2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Xiang Li ◽  
Xin Jin ◽  
Qixu Wang ◽  
Mingsheng Cao ◽  
Xingshu Chen

The Internet of Things (IoT) offers a wide variety of benefits to our daily lives in many ways, ranging from smart wearable devices to industrial systems. However, it also brings well-known security and compliance concerns, especially in the physical layer. In addition, due to numerous IoT architectures which have been developed and deployed based on the cloud, the security and compliance of IoT depend on the cloud thoroughly. In this paper, a secure and compliant continuous assessment framework (SCCAF) is proposed to evaluate the security and compliance levels of cloud services in life-cycle. The SCCAF facilitates cloud service to customers to select an optimal cloud service provider (CSP) which satisfies their desired security requirements. Moreover, it also enables cloud service customers to evaluate the compliance of the selected CSP in the process of using cloud services. To evaluate the performance and availability of SCCAF, we carry out a series of experiments with case study and real-world scenario datasets. Experimental results show that SCCAF can assess the security and compliance of CSPs efficiently and effectively.


Author(s):  
Kenneth J. Knapp

To promote the development of inherently secure software, this chapter describes various strategies and techniques for integrating security requirements into the systems development life cycle (SDLC). For each major phase of the SDLC, recommendations are made to promote the development of secure information systems. In brief, developers should identify risks, document initial requirements early, and stress the importance of security during each phase of the SDLC. Security concerns are then offered for less traditional models of systems analysis and development. Before concluding, future trends are discussed. Practitioners who read this chapter will be better equipped to improve their methodological processes by addressing security requirements in their development efforts.


Sign in / Sign up

Export Citation Format

Share Document