11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Challenge: S<strong>of</strong>tware Vulnerabilities 170<br />

A Solution: Vulnerability Analysis, Remediation, and Discovery 170<br />

The Consequence: Improved Vendor Practices, Well-Informed System<br />

Mangers 171<br />

The <strong>SEI</strong> Contribution 172<br />

References 172<br />

Malicious Code Analysis 173<br />

The Challenge: Malicious Code 173<br />

A Solution: Malicious Code Database and Analysis 173<br />

The Consequence: Faster Response to Malicious Code Attacks, Better Control 174<br />

The <strong>SEI</strong> Contribution 174<br />

References 175<br />

Secure Coding 177<br />

The Challenge: Preventing S<strong>of</strong>tware Vulnerabilities 177<br />

A Solution: Secure Coding Standards and Practices 177<br />

The Consequence: More Secure Products 179<br />

The <strong>SEI</strong> Contribution 179<br />

References 180<br />

Network Situational Awareness 181<br />

The Challenge: Visibility <strong>of</strong> Large Networks 181<br />

A Solution: Network Situational Awareness Tools and Techniques 181<br />

The Consequence: Improved Situational Awareness with <strong>SEI</strong> Tools 182<br />

The <strong>SEI</strong> Contribution 182<br />

References 183<br />

Insider Threat 184<br />

The Challenge: Cyber Attacks by Insiders 184<br />

A Solution: Insider Threat Research and Solutions 184<br />

The Consequence: Improved Insider Threat Detection and Response 186<br />

The <strong>SEI</strong> Contribution 186<br />

References 186<br />

Information Security Assessments 188<br />

The Challenge: Managing Risks to Enterprise-Wide Information Security 188<br />

A Solution: Managing Risks to Enterprise-Wide Information Security 188<br />

The Consequence: Enterprise Risk Management and Security Improvement 189<br />

The <strong>SEI</strong> Contribution 190<br />

References 190<br />

Cybersecurity Engineering 192<br />

The Challenge: S<strong>of</strong>tware Security Assurance 192<br />

A Solution: Build In Security from <strong>the</strong> Start 192<br />

The Consequence: Improved S<strong>of</strong>tware Development and Acquisition Practices 194<br />

The <strong>SEI</strong> Contribution 194<br />

References 195<br />

6 S<strong>of</strong>tware Engineering Methods 197<br />

Introduction to S<strong>of</strong>tware Engineering Methods 199<br />

Demands <strong>of</strong> Increasing Reliance on S<strong>of</strong>tware Systems 199<br />

Evolving S<strong>of</strong>tware Configuration Management 199<br />

Developing Community Standards: Computer-Aided S<strong>of</strong>tware Engineering 199<br />

Developing Community Standards: Open Systems Engineering 199<br />

Aiding Understanding <strong>of</strong> Expanding Technology 200<br />

Managing and Engineering COTS-Based Systems 200<br />

Assurance Cases: Addressing Systems <strong>of</strong> Systems Challenges 201<br />

References 202<br />

Configuration Management 203<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited<br />

vi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!