Secure Software Education

2010 ◽  
Vol 1 (4) ◽  
pp. 35-61 ◽  
Author(s):  
J. J. Simpson ◽  
M. J. Simpson ◽  
B. Endicott-Popovsky ◽  
V. Popovsky

This article establishes a context for secure information systems development as well as a set of models used to develop and apply a secure software production pedagogy. A generic system model is presented to support the system context development, and to provide a framework for discussing security relationships that exist between and among information systems and their applications. An asset protection model is tailored to provide a conceptual ontology for secure information system topics, and a stable logical framework that is independent of specific organizations, technologies, and their associated changes. This asset protection model provides a unique focus for each of the three primary professional communities associated with the development and operation of secure information systems. In this paper, a secure adaptive response model is discussed to provide an analytical tool to assess risk associated with the development and deployment of secure information systems, and to use as a security metric. A pedagogical model for information assurance curriculum development is then established in the context and terms of the developed secure information system models. The relevance of secure coding techniques to the production of secure systems, architectures, and organizational operations is also discussed.

Author(s):  
J. J. Simpson ◽  
M. J. Simpson ◽  
B. Endicott-Popovsky ◽  
V. Popovsky

This article establishes a context for secure information systems development as well as a set of models used to develop and apply a secure software production pedagogy. A generic system model is presented to support the system context development, and to provide a framework for discussing security relationships that exist between and among information systems and their applications. An asset protection model is tailored to provide a conceptual ontology for secure information system topics, and a stable logical framework that is independent of specific organizations, technologies, and their associated changes. This asset protection model provides a unique focus for each of the three primary professional communities associated with the development and operation of secure information systems. In this paper, a secure adaptive response model is discussed to provide an analytical tool to assess risk associated with the development and deployment of secure information systems, and to use as a security metric. A pedagogical model for information assurance curriculum development is then established in the context and terms of the developed secure information system models. The relevance of secure coding techniques to the production of secure systems, architectures, and organizational operations is also discussed.


2018 ◽  
Vol 4 (1) ◽  
pp. 93-97
Author(s):  
Ardian Dwi Praba

Abstract - in this era of disruptive like nowadays, information systems are becoming staples in every area that we do. Almost all jobs have an information system that is used to help complete the work so that it becomes more effective. Library processing a lot of data that should be processed well and fast that can give you maximum service to our customers. Besides information system built to manage all data, the security of information systems should be a major concern so that data can be stored safely and avoid attack or deface from people who are not responsible. One way to secure information systems we make is by separating the model view and the controller so that the system will be difficult to hack or on disable. With the CodeIgniter Framework then we would be easier in making a website that is secure because in the CodeIgniter has the concept of the Model View Controller (MVC). Keywords: Framework, CodeIgniter, Sistem, mvc


Author(s):  
Tanty Oktavia

 Tutoring institution is an organization which focuses in education. The objective of this institution is improving the quality of learning of all students to achieve the desired target. The operational activities of this institution consist of registration, scheduling, evaluation, and administration supporters. It will be less effective if the processes are done manually. Therefore, many institutions are starting to restructure the model of information systems to support the company’s operations. This study describes about designing an information system model using object oriented approach based on the methodology introduced by Satzinger, where each phase is represented by using UML diagrams. The result achieved in this research is to produce a general model of information systems in supporting the operations of a tutoring institution. Designing an information system that is compatible with business processes can maximize the company's operations to run efficiently and effectively so as provides a competitive advantage from its competitors.


2017 ◽  
Vol 4 (1) ◽  
pp. 44
Author(s):  
Dwi Deswary ◽  
Ary Sutanto

This research aims to find out descriptively about: the needs of management information systems in the Master Program of Education Management Graduate School, State University of Jakarta (UNJ), planning of management information system model that needed, the development of management information system model, and testing of management information system model. The method used is research and development. Data collected by observation, interview, documentation study, and audio-visual material. The research findings inform that in the Master program study of Education Management, data management and information currently been carried out using information systems as processing and storage of data and information. Needs that exist in the course include the need for tools, software, and human resources. Needs in the form of equipment such as computers, networks, and other support tools have been prepared. Software requirements include information system software. While human resources need such as the provision of administrative and IT staff that competent for the job. Planning includes the design objectives, aspects of education management, procedures, and design models. The design model consists of design of data flowchart and structure menu that illustrates the systems and sub-systems of the information system that designed. Development of the model is done by developing a few things like the development of graphic design, engineering source code, local webserver installation, and design layout. Development is based on the needs analysis and planning. Tests carried out in three stages. The first phase was conducted to test the way of supporting components on the local computer system. The second phase was conducted to test the way of the system designed after being embedded on a local webserver. The third phase is done to test the way of the overall information system.


Author(s):  
P.K. Paul ◽  
A. Bhuimali ◽  
P. S. Aithal ◽  
R. Rajesh

Information Assurance is the prime name for the security and privacy related affairs. It is responsible for the secure design, development and building of healthy sophisticated information systems. The technologies have become crucial for the development of content and information systems. Information Assurance is a new name in respect of Computing and IT Security; however, it has important significance as the area deals with both traditional and technological security related affairs. The IT Security primarily responsible for the computational secure systems whereas Information Assurance focuses not only on the design and development of secure systems but also policies, framework and regulations leading to secure information systems preparation. Among the technological space few common names are include vulnerabilities, virus, denial of services etc. Moreover, the vulnerabilities include the affairs of hardware, software, network, personal and physical site, organizational security systems etc. This paper talks about the basics of Information Assurance and allied affairs. Moreover, it talks about the vulnerabilities and affairs leading to computer access control, application security, authentication, authorization, aspects of data centric security, encryption, firewall etc. The paper also highlights the basic overview of the technologies and solution as well.


The research aims to produce that accounting information systems intruductional modul for college of department of information in indonesia administrasion foundation (YAI). The research was implementation at the department of information YAI for 1 year 2 months in the research and development (R & D) methode with Dick And Carey model of design. The accounting information systems learning consepts was collection of resources,designedto transform financial and other data into information from Bodnar. The results indicated that 30 respondens in field trials produce until the finished of product module accounting was effective and efficient and had an appeal. Results of study subjects accounting information system can be increased after using the accounting information system model that availability of accounting information system model can be used as a source of intructional for college of department of information in institute administration of indonesia. The development of accounting information systems learning module is very important to help teaching process. Therefore the Persada Indonesia YAI is trying to develop it. This module is using ADDIE model, Gerlach and Ely, J.E Kemp, Bella H Banathy, MPI model, Borg and Gali , Dick and Carey model The result area Students are obtaining learning resources for self-study, Students are more eager to learn, because already available SIA print module, Student learning outcomes have increased finally Based on the results of interviews with lecturers SIA module developed to give a positive impact for lecturers and students


Author(s):  
Kenneth J. Knapp

To promote the development of inherently secure software, this chapter describes various strategies and techniques for integrating security requirements into the systems development life cycle (SDLC). For each major phase of the SDLC, recommendations are made to promote the development of secure information systems. In brief, developers should identify risks, document initial requirements early, and stress the importance of security during each phase of the SDLC. Security concerns are then offered for less traditional models of systems analysis and development. Before concluding, future trends are discussed. Practitioners who read this chapter will be better equipped to improve their methodological processes by addressing security requirements in their development efforts.


Author(s):  
Jo-Mae B. Maris

Cross-discipline research requires researchers to understand many concepts outside their own discipline. Computers are becoming pervasive throughout all disciplines, as evident by the December 2002 issue of Communications of the ACM featuring “Issues and Challenges in Ubiquitous Computing” (Lyytinen & Yoo, 2002). Researchers outside of computer network-related disciplines must account for the affects of network-based information systems on their research. This paper presents a model to aid researchers with the tasks of properly identifying the elements and affects of a network-based information system within their studies. 


Author(s):  
HARALAMBOS MOURATIDIS ◽  
MICHAEL WEISS ◽  
PAOLO GIORGINI

In this paper we describe an approach for modeling security issues in information systems. It is based on an agent-oriented approach, and extends it with the use of security patterns. Agent-oriented software engineering provides advantages when modeling security issues, since agents are often a natural way of conceptualizing an information system, in particular at the requirements stage, when the viewpoints of multiple stakeholders need to be considered. Our approach uses the Tropos methodology for modeling a system as a set of agents and their social dependencies, with specific extensions for representing security constraints. As an extension to the existing methodology we propose the use of security patterns. These patterns capture proven solutions to common security issues, and support the systematic and structured mapping of these constraints to an architectural model of the system, in particular for non-security specialists.


Sign in / Sign up

Export Citation Format

Share Document