11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>SEI</strong> concern about risks posed to national and economic security provided <strong>the</strong> impetus for<br />

evaluation methods that give <strong>the</strong> DoD and o<strong>the</strong>r organizations a view <strong>of</strong> risk to <strong>the</strong>ir information<br />

systems, along with practices for protecting those systems. OCTAVE is a suite <strong>of</strong> techniques,<br />

methods, and tools for assessing information security risks to critical government and business assets,<br />

<strong>the</strong> foundation for planning continuous risk management. A related assessment is Computer<br />

Network Defense (CND) metrics, which focus on risks in CSIRT incident management. The U.S.<br />

Army and Air Force use OCTAVE to help meet HIPPA regulations, and <strong>the</strong> technique has been<br />

taught at DoD medical treatment facilities around <strong>the</strong> globe.<br />

As part <strong>of</strong> its effort to influence product development, <strong>the</strong> <strong>SEI</strong> began looking at how to incorporate security<br />

early in <strong>the</strong> s<strong>of</strong>tware development lifecycle. The Cybersecurity Engineering group focuses on<br />

using engineering solutions to address this challenge. The DoD and federal agencies benefit from<br />

frameworks and methods that support decisions from acquisition through operation, which organize<br />

research and practice areas for building assured systems, and that guide measurement and analysis.<br />

SQUARE (Security Requirements Engineering) gives developers a process for identifying security and<br />

privacy requirements from <strong>the</strong> start; A-SQUARE, an addition to <strong>the</strong> SQUARE suite, aids in acquisition<br />

<strong>of</strong> stable products with security as an integral attribute ra<strong>the</strong>r than an add-on.<br />

Future research and development will enable <strong>the</strong> CERT Division to keep up with changing technology,<br />

risks, attacks, and DoD s<strong>of</strong>tware assurance needs.<br />

References<br />

[ACM 1989] Communications <strong>of</strong> <strong>the</strong> ACM 32, 6 (June 1989): Entire issue devoted to <strong>the</strong> subject<br />

<strong>of</strong> <strong>the</strong> Morris Worm. Example article: Eugene H. Spafford, “The Internet Worm: Crisis and Aftermath:”<br />

678-687.<br />

[FAS 2000] Federation <strong>of</strong> American Scientists. “Blacker.” http://www.fas.org/irp/program/security/blacker.htm<br />

(2000).<br />

[Howard 1997] Howard, John D. “An Analysis <strong>of</strong> Security Incidents on <strong>the</strong> Internet 1989-1995.”,<br />

PhD diss., Carnegie Mellon University, 1997. https://resources.sei.cmu.edu/library/assetview.cfm?assetID=52454<br />

[Leiner 2012] Leiner, Barry M.; Cerf, Vinton G.; Clark, David D.; Kahn, Robert R., et al. “Brief<br />

<strong>History</strong> <strong>of</strong> <strong>the</strong> Internet.” Internet Society. http://www.internetsociety.org/internet/internet-51/history-internet/brief-history-internet<br />

(2012).<br />

[Moitra 2004] Moitra, Soumyo & Konda, Suresh. “An Empirical Investigation <strong>of</strong> Network Attacks<br />

on Computer Systems,” Computers and Security 23, 1 (February 2004): 43-51.<br />

[Museum 2006] Computer <strong>History</strong> Museum. “Internet <strong>History</strong>.” http://www.computerhistory.org/internet_history<br />

(2006).<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 165<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!