Measuring Application Security

被引:0
|
作者
Horn, Christopher [1 ]
D'Amico, Anita [2 ]
机构
[1] Secure Decis, Clifton Pk, NY 12065 USA
[2] Code Dx, Northport, NY USA
关键词
Application security; Security management; Security metrics; Program management; Risk management; METRICS;
D O I
10.1007/978-3-319-94782-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We report on a qualitative study of application security (AppSec) program management. We sought to establish the boundaries used to define program scope, the goals of AppSec practitioners, and the metrics and tools used to measure performance. We find that the overarching goal of AppSec groups is to ensure the security of software systems; this is a process of risk management. AppSec boundaries varied, but almost always excluded infrastructure-level system components. Seven top-level questions guide practitioner efforts; those receiving the most attention are Where are the application vulnerabilities in my software?, Where are my blind spots?, How do I communicate & demonstrate AppSec's value to my management?, and Are we getting better at building in security over time?. Many metrics are used to successfully answer these questions, but one challenge stood out: there is no good way to measure AppSec risk. No one metric system dominated observed usage.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 50 条
  • [41] New security paradigm for application security infrastructure
    Jin, SH
    Cho, SR
    Choi, DS
    Ryou, JC
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 793 - 802
  • [42] RFID and Application Security
    DeNoia, Lynn A.
    Olsen, Anne L.
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2009, 41 (03): : 209 - 221
  • [43] Autologout for application security
    Lurie, J
    [J]. DR DOBBS JOURNAL, 2003, 28 (10): : 50 - 51
  • [44] Mobile Application Security
    Lin, Ying-Dar
    Huang, Chun-Ying
    Wright, Matthew
    Kambourakis, Georgios
    [J]. COMPUTER, 2014, 47 (06) : 21 - 23
  • [45] The Uncontrolled Web: Measuring Security Governance on the Web
    Takata, Yuta
    Kumagai, Hiroshi
    Kamizono, Masaki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (11): : 1828 - 1838
  • [46] Measuring the Interplay of Security Principles in Software Architectures
    Buyens, Koen
    Scandariato, Riccardo
    Joosen, Wouter
    [J]. ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 555 - 564
  • [47] Measuring Data Security for a Cloud Computing Service
    Shaikh, Rizwana A. R.
    Modak, Masooda M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [48] Measuring the complexity of computer security visualization designs
    Suo, X.
    Zhu, Y.
    Owen, G. Scott
    [J]. VIZSEC 2007, 2008, : 53 - 66
  • [49] Measuring household food security: the global experience
    Melgar-Quinonez, Hugo
    Hackett, Michelle
    [J]. JOURNAL OF PHYSICAL THERAPY SCIENCE, 2008, 21 : 27 - 37
  • [50] Measuring user satisfaction with information security practices
    Zimmermann Montesdioca, Gustavo Percio
    Gastaud Magada, Antonio Carlos
    [J]. COMPUTERS & SECURITY, 2015, 48 : 267 - 280