Text
Cyber security engineering: a practical approach for systems and software assurance
Contents:
Chapter 1 Cyber security engineering: lifecycle assurance of systems and software
1.1 Intoduction
1.2 What do we mean by lifecycle assurance
1.3 Introducing principles for software assurance
1.4 Addressing lifecycle assurance
1.5 Case studies used in this book
Chapter 2 Risk analysis-identifying and prioritizing needs
2.1 Risk management concepts
2.2 Mission risk
2.3 Mission risk analysis
2.4 Security risk
2.5 Security risk analysis
2.6 Operational risk analysis-comparing planned to actual
2.7 Summary
Chapter 3 Secure software development management and organizational models
3.1 The management dilemma
3.2 Process models for software development and acquisition
3.3 Software security frameworks, models, and roadmaps
3.4 Summary
Chapter 4 Engineering competencies
4.1 Security competency and the software engineering profession
4.2 Software assurance competency models
4.3 The DHS competency models
4.4 The SEI software assurance competency model
4.5 Summary
Chapter 5 Performing gap analysis
5.1 Introduction
5.2 Using the SEI’s SwA competency model
5.3 Using the BSIMM
5.4 Summart
Chapter 6 Metrics
6.1 How do define and structure matrics to manage
6.2 Ways to gather evidence for cyber security evaluation
Chapter 7 Special topics in cyber security engineering
7.1 Introduction
7.2 Security: not just a technical issue
7.3 Cyber security standards
7.4 Security requirements engineering for acquisition
7.5 Operational competencies (DevOps)
7.6 Using malware analysis
7.7 Summary
Chapter 8 Summary and plan for improvements in cyber security engineering performance
8.1 Introduction
8.2 Getting started on an improvement plan
8.3 Summary
References
Bibliography
Appendix A: Wea case study: evaluating security risks using mission threads
Appendix B: The MSwA body of knowledge with maturity levels added
Appendix C: The software assurance curriculum project
Appendix D: The software assurance competency model designations
Appendix E: Proposed SwA competency mappings
Appendix F: BSIMM assessment final report
Appendix G: Measures from lifecycle activities security resources and software assurance
principles
Index
No other version available