Appraisals Based on Security Best Practices for Software Configurations

被引:0
|
作者
Araujo Neto, Afonso [1 ]
Vieira, Marco [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, CISUC, P-3000 Coimbra, Portugal
关键词
D O I
10.1109/LADC.2009.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Protecting systems and data from malicious access and corruption requires the existence of effective security mechanisms and the correct configuration of those mechanisms. Configuring large software systems for security is a complex task, entailing a lot of expertise that many administrators do not have. This paper proposes a generic methodology to condense widespread information about security best practices into easy-to-use appraisals for three scenarios: 1) to assess how effective software configurations are in terms of fulfilling best practices; 2) to understand the set of best practices that can be implemented when using a given software product; and 3) to evaluate how well a system administrator knows existing security best practices. Following this methodology we defined an appraisal for database systems configurations, which was used to evaluate four real installations. Experimental results show the usefulness of this kind of security appraisals.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 50 条
  • [1] Best Practices for Software Security: An Overview
    Yasar, Ansar-Ul-Haque
    Preuveneers, Davy
    Berbers, Yolande
    Bhatti, Ghasan
    INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 169 - +
  • [2] Best practices for teaching UML based software development
    Kuzniarz, L
    Staron, M
    SATELLITE EVENTS AT THE MODELS 2005 CONFERENCE, 2006, 3844 : 320 - 332
  • [3] A software process improvement framework based on best practices
    Walter, Bartosz
    Marovic, Branko
    Garnizov, Ivan
    Wolski, Marcin
    Todosijevic, Andrijana
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (09)
  • [4] Software-as-a-Service Security Challenges and Best Practices: A Multivocal Literature Review
    Humayun, Mamoona
    Niazi, Mahmood
    Almufareh, Maram Fahhad
    Jhanjhi, N. Z.
    Mahmood, Sajjad
    Alshayeb, Mohammad
    APPLIED SCIENCES-BASEL, 2022, 12 (08):
  • [5] Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension
    Mesquida, Antoni Lluis
    Mas, Antonia
    COMPUTERS & SECURITY, 2015, 48 : 19 - 34
  • [6] Best practices cyber security
    Scherer, Rob
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2019, 257
  • [7] Best practices for VoIP security
    VanWart, Scott
    COMMUNICATIONS NEWS, 2007, 44 (08): : 28 - 29
  • [8] BEST PRACTICES IN AUTOMATION SECURITY
    McKay, Murray
    2012 IEEE-IAS/PCA 54TH CEMENT INDUSTRY TECHNICAL CONFERENCE, 2012,
  • [9] Best practices in software engineering
    Saiedian, H
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 61 (03) : 171 - 172
  • [10] Privacy and Security: Best Practices for Global Security
    Millar, Sheila A.
    JOURNAL OF INTERNATIONAL TRADE LAW AND POLICY, 2006, 5 (01) : 36 - +