The purpose of this Guide is to assist automakers, suppliers and auto industry stakeholders as they design, mature and operate their vehicle cyber incident response capabilities.
The Security Development Lifecycle
โ Scribed by Howard, Michael;Lipner, Steve
- Publisher
- O'Reilly Media, Inc
- Year
- 2009
- Tongue
- English
- Leaves
- 962
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugsthe Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDLfrom education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.;The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software; Introduction; Organization of This Book; Part II, "The Security Development Lifecycle Process"; Part III, "SDL Reference Material"; The Future Evolution of the SDL; What's on the Companion Disc?; System Requirements; Acknowledgments; References; I. The Need for the SDL; Another Factor That Influences Security: Reliability; It's Really About Quality; Why Major Software Vendors Should Create More Secure Software; Why In-House Software Developers Should Create More Secure Software.
โฆ Table of Contents
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
Introduction
Organization of This Book
Part II, "The Security Development Lifecycle Process"
Part III, "SDL Reference Material"
The Future Evolution of the SDL
What's on the Companion Disc?
System Requirements
Acknowledgments
References
I. The Need for the SDL
Another Factor That Influences Security: Reliability
It's Really About Quality
Why Major Software Vendors Should Create More Secure Software
Why In-House Software Developers Should Create More Secure Software. Why Small Software Developers Should Create More Secure SoftwareSummary
References
2. Current Software Development Methods Fail to Produce Secure Software
Understanding Security Bugs
Critical Mass
"Many Eyeballs" Misses the Point Altogether
Proprietary Software Development Methods
Agile Development Methods
Common Criteria
Summary
References
3. A Short History of the SDL at Microsoft
New Threats, New Responses
Windows 2000 an.
โฆ Subjects
Computer security;Computer software--Development;Computer software--Reliability;omputer software--Reliability;Electronic books;Computer software -- Development;Computer software -- Reliability;omputer software -- Reliability
๐ SIMILAR VOLUMES
This introduction to the Security Development Lifecycle (SDL) provides a history of the methodology and guides you through each stage of a proven process-from design to release-that helps minimize security defects.
<b>BUILDING SECURE CARS</b> <p><b>Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycle</b></p><p>While increased connectivity and advanced software-based automotive systems provide tremendous benefits an
As more and more manufacturers seek to make products that can connect to the internet, says Dhondge, security of the Internet of Things (IoT) remains one of the leading concerns. He summarizes recent developments and the current status of the issue, writing for all the professionals working on IoT.
ANSI/ISA-62443-4-1 specifies process requirements for the secure development of products used in industrial automation and control systems. It defines a secure development life-cycle (SDL) for the purpose of developing and maintaining secure products. This life-cycle includes security requirements d