Security Assessment Techniques for Software Assurance - a "Virtual Team" Approach

被引:0
|
作者
Isaacs, Derek [1 ]
机构
[1] Boecore Inc, Colorado Springs, CO USA
关键词
Information assurance; software assurance; software testing; virtual systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software Assurance / Software "Security" often imposes a requirement that applications be tested in a "live" (or as close to as is practicable) system - this often includes the surrounding implementation environment as greater fidelity is needed for critical application testing and implementation confidence levels. Merely installing the software and performing a "short list" verification activity is insufficient - actual " hands on" execution of the software is needed - and when this can be done in a simulated live environment - a higher confidence level can be extended to the application target of evaluation (TOE) for implementation. This task is daunting not because of the nature of the testing - but of the need to setup and subsequently tear-down systems to participate in the performance of these tests. Fortunately - there are tools and techniques for testing application security - using a reduced set of hardware and yet maintaining operational fidelity. Virtual Machines (VM)'s and virtual network environments (team architectures) offer a method for providing this level of testing confidence while allowing for a greater variety of tests and test participant systems. This paper presents a series of architectures and scenarios proposed to implement such a testing environment that retains the viability (and fidelity) of a 'real-world' network environment while providing an isolated and restricted test and analysis area. This is shown through a series of scenarios and VM Team setups (scenario players) in a virtual machine based environment. This approach allows a number of benefits: Isolation of the testing environment Focus on the Target of Evaluation (TOE) for testing Capture and provide metrics on tool and technique usage and impact Provide limits and mitigation of risk and liability issues for the TOE The VM environment also offers a unique opportunity to simulate interactions between various known systems under test (TOE)'s in a 'replicated' environment. A set of proposed scenarios and an environmental architecture, including toolsets and targets of evaluation (TOE) systems is proposed. The applicability of the VM 'team' systems approach is discussed through a suite of scenarios designed to illustrate System evaluation, monitoring, and detection.
引用
收藏
页码:500 / 506
页数:7
相关论文
共 50 条
  • [21] AN APPROACH TO SOFTWARE QUALITY ASSURANCE TRAINING
    MANNS, TS
    COLEMAN, MJ
    STATISTICIAN, 1987, 36 (05): : 493 - 498
  • [22] Special Issue on Security and Dependability Assurance of Software Architectures
    Damiani, Ernesto
    Guergens, Sigrid
    Mana, Antonio
    Spanoudakis, George
    Ardagna, Claudio A.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) : 229 - 230
  • [23] An Immune Intelligent Approach for Security Assurance
    Enache, Adriana-Cristina
    Ionita, Mihai
    Sgarciu, Valentin
    2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
  • [24] Systems and Software Assurance - A Model Cyber Security Course
    Jovanovic, V.
    Harris, J. K.
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 923 - 927
  • [25] Using Security Metrics in Software Quality Assurance Process
    Abdi, Athena
    Souzani, Afshin
    Amirfakhri, Maliheh
    Moghadam, Azadeh Bamdad
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1099 - 1102
  • [26] A security assurance framework for component based software development
    Kumar, Ashwin M.V.N.
    Singh, Arun K.
    Babu S., Ramesh
    Informatica (Ljubljana), 2001, 25 (04) : 509 - 515
  • [27] A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
    Sadeghi, Alireza
    Bagheri, Hamid
    Garcia, Joshua
    Malek, Sam
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 43 (06) : 492 - 530
  • [28] Robustness and Security Assessment of Image Watermarking Techniques by a Stochastic Approach
    Conotter, V.
    Boato, G.
    Fontanari, C.
    De Natale, F. G. B.
    IMAGE PROCESSING: ALGORITHMS AND SYSTEMS VII, 2009, 7245
  • [29] QUALITY ASSURANCE TECHNIQUES - CRITICALITY ASSESSMENT
    CORBIN, WL
    DUKE, J
    MECHANICAL ENGINEERING, 1980, 102 (04) : 80 - 80
  • [30] An improved network security situation assessment approach in software defined networks
    Zhijie Fan
    Ya Xiao
    Amiya Nayak
    Chengxiang Tan
    Peer-to-Peer Networking and Applications, 2019, 12 : 295 - 309