Security Assessment Techniques for Software Assurance - a "Virtual Team" Approach

被引:0
|
作者
Isaacs, Derek [1 ]
机构
[1] Boecore Inc, Colorado Springs, CO USA
关键词
Information assurance; software assurance; software testing; virtual systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software Assurance / Software "Security" often imposes a requirement that applications be tested in a "live" (or as close to as is practicable) system - this often includes the surrounding implementation environment as greater fidelity is needed for critical application testing and implementation confidence levels. Merely installing the software and performing a "short list" verification activity is insufficient - actual " hands on" execution of the software is needed - and when this can be done in a simulated live environment - a higher confidence level can be extended to the application target of evaluation (TOE) for implementation. This task is daunting not because of the nature of the testing - but of the need to setup and subsequently tear-down systems to participate in the performance of these tests. Fortunately - there are tools and techniques for testing application security - using a reduced set of hardware and yet maintaining operational fidelity. Virtual Machines (VM)'s and virtual network environments (team architectures) offer a method for providing this level of testing confidence while allowing for a greater variety of tests and test participant systems. This paper presents a series of architectures and scenarios proposed to implement such a testing environment that retains the viability (and fidelity) of a 'real-world' network environment while providing an isolated and restricted test and analysis area. This is shown through a series of scenarios and VM Team setups (scenario players) in a virtual machine based environment. This approach allows a number of benefits: Isolation of the testing environment Focus on the Target of Evaluation (TOE) for testing Capture and provide metrics on tool and technique usage and impact Provide limits and mitigation of risk and liability issues for the TOE The VM environment also offers a unique opportunity to simulate interactions between various known systems under test (TOE)'s in a 'replicated' environment. A set of proposed scenarios and an environmental architecture, including toolsets and targets of evaluation (TOE) systems is proposed. The applicability of the VM 'team' systems approach is discussed through a suite of scenarios designed to illustrate System evaluation, monitoring, and detection.
引用
收藏
页码:500 / 506
页数:7
相关论文
共 50 条
  • [41] Using concept maps to introduce software security assurance cases
    Snider, Dallas, 1600, U.S. Department of Defense (27):
  • [42] Security characterisation and integrity assurance for component-based software
    Han, J
    Zheng, YL
    INTERNATIONAL CONFERENCE ON SOFTWARE METHODS AND TOOLS, PROCEEDING, 2000, : 61 - 66
  • [43] Security Transparency Assurance Technology for Analysis and Visualization of Software Components
    Uehara T.
    Kanemoto Y.
    Nomura H.
    NTT Technical Review, 2023, 21 (04): : 67 - 70
  • [44] Application security code analysis: A step towards software assurance
    Rawat, Sanjay
    Saxena, Ashutosh
    International Journal of Information and Computer Security, 2009, 3 (01) : 86 - 110
  • [45] Software security: The language approach
    Costa, Gabriele
    Degano, Pierpaolo
    Galletta, Letterio
    Mondo Digitale, 2019, 18 (86):
  • [46] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +
  • [47] Towards Evaluation of Security Assurance during the Software Development Lifecycle
    Uusitalo, Ilkka
    Karppinen, Kaarina
    Ahonen, Pasi
    Pentikainen, Heimo
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 817 - 822
  • [48] Research on Value Assessment of Team Members in Virtual Team Creation
    Xie, Luning
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 260 - 263
  • [49] An Architecture Centric Approach to Safety and Security Assurance
    Cohen, Sholom
    Hudak, John J.
    McGregor, John
    2021 IEEE/AIAA 40TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2021,
  • [50] An approach for situational software quality assurance methods
    Hassine, L
    Ben Ghezala, H
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2004, 111 : 331 - 341