Cyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering) by Nancy R. Mead & Carol Woody
Author:Nancy R. Mead & Carol Woody [Mead, Nancy R.]
Language: eng
Format: epub, mobi
Publisher: Pearson Education
Published: 2016-11-06T23:00:00+00:00
7.2 Security: Not Just a Technical Issue1
1. This section was contributed by Julia Allen.
7.2.1 Introduction
This section defines the scope of governance concern as it applies to security. It describes some of the top-level considerations and characteristics to use as indicators of a security-conscious culture and to determine whether an effective program is in place.
Security’s days as just a technical issue are over. Security is becoming a central concern for leaders at the highest levels of many organizations and governments, and it transcends national borders. Today’s organizations face constant high-impact security incidents that can disrupt operations and lead to disclosure of sensitive information. Customers are demanding greater security as evidence suggests that violations of personal privacy, the disclosure of personally identifiable information, and identity theft are on the rise. Business partners, suppliers, and vendors are requiring greater security from one another, particularly when providing mutual network and information access. Networked efforts to steal competitive intelligence and engage in extortion are becoming more prevalent. Security breaches and data disclosure increasingly arise from criminal behavior motivated by financial gain as well as state-sponsored actions motivated by national strategies.
Current and former employees and contractors who have or had authorized access to their organization’s system and networks are familiar with internal policies, procedures, and technology and can exploit that knowledge to facilitate attacks and even collude with external attackers. Organizations must mitigate malicious insider acts such as sabotage, fraud, theft of confidential or proprietary information, and potential threats to our nation’s critical infrastructure. Recent CERT research documents cases of successful malicious insider incidents even during the software development lifecycle.2
2. Refer to the CERT Insider Threat website (www.cert.org/insider-threat/publications) for presentations and podcasts on this subject.
In the United States, managing cyber security risk is becoming a national imperative. In February 2013, the U.S. president issued an executive order3 to enhance the security of the nation’s critical infrastructure, resulting in the development of the National Institute of Standards and Technology (NIST) Cybersecurity Framework [NIST 2014]. According to the IT Governance Institute, “boards of directors will increasingly be expected to make information security an intrinsic part of governance, integrated with processes they already have in place to govern other critical organizational resources” [ITGI 2006]. The National Association of Corporate Directors (NACD) states that the cyber security battle is being waged on two levels—protecting a corporation’s most valuable assets and the implications and consequences of disclosure in response to legal and regulatory requirements [Warner 2014]. According to an article in NACD Magazine, “Cybersecurity is the responsibility of senior leaders who are responsible for creating an enterprise-wide culture of security” [Warner 2014]. At an international level, the Internet Governance Forum (IGF)4 provides a venue for discussion of public policy issues, including security, as they relate to the Internet. Ultimately, directors and senior executives set the direction for how enterprise security—including software security—is perceived, prioritized, managed, and implemented. This is governance in action.
3. www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
4. www.intgovforum.org/cms/home-36966
The Business Roundtable (an association of chief executive officers of leading U.S. companies) recommends the following in its
Download
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering) by Nancy R. Mead & Carol Woody.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15748)
The Mikado Method by Ola Ellnestam Daniel Brolund(13010)
Hello! Python by Anthony Briggs(12848)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12079)
Dependency Injection in .NET by Mark Seemann(11908)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10696)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10535)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10471)
Grails in Action by Glen Smith Peter Ledbrook(9996)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9806)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9379)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8598)
Kotlin in Action by Dmitry Jemerov(8515)
The Kubernetes Operator Framework Book by Michael Dame(8481)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8303)
Robo-Advisor with Python by Aki Ranin(8258)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)