Cybersecurity Practices At The Initial Stages Of The Software Engineering Process

被引:0
作者
Gonzalez, Hugo [1 ]
Llamas-Contreras, Rafael [1 ]
Guerra-Garcia, Cesar [2 ]
机构
[1] UPSLP, ATIT, San Luis Potosi, San Luis Potosi, Mexico
[2] UASLP, Unidad Altiplano, San Luis Potosi, San Luis Potosi, Mexico
来源
2021 9TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2021) | 2021年
关键词
Software Engineering; Cybersecurity; Teaching;
D O I
10.1109/CONISOFT52520.2021.00037
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software Engineering is a foundation of modern computer systems development. The process involves several steps, including Analysis and Design, which are the fundamentals for building software systems. This discipline is offered by several university degrees these days around the world, included among other computer science courses. Nowadays, cybersecurity problems are very related with software weakness or bad designs, as an example one can mention bad implementations, projects with poor quality, lack of testing, among others issues. Overall one bigger problem is the lack of security integration from the inception and designing of the software project. Cybersecurity had gained a lot of attention in recent years. From the everyday desktop software been abused and exploited, such as browser exploits and Windows RDP protocol exploits, to abusing the Internet of Things to create massive botnets capable to disrupt the Internet service, as such as the Mirai attack in 2017. We believe that if security played a basic role from the inception of the software project, a lot of these incidents could be prevented. We previously proposed to introduce cybersecurity basics in the software engineering courses to raise awareness of these problems to future professional software engineers. In this paper, we focus on the first steps of software engineering and how cybersecurity should be embedded as good practices for every student in any given software project.
引用
收藏
页码:219 / 226
页数:8
相关论文
共 22 条
[1]   Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment [J].
Ahmad, Javed ;
Mohammad, Chaudhary Wali ;
Sadiq, Mohd .
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, :58-63
[2]  
Aldawood H, 2018, PR IEEE INT CONF TEA, P62, DOI 10.1109/TALE.2018.8615162
[3]  
Carella A, 2017, IEEE INT CONF BIG DA, P4458, DOI 10.1109/BigData.2017.8258485
[4]  
da Silva M. A., 2015, IMPORTANCE SECURITY
[5]  
Dodson D., 2019, MITIGATING RISK SOFT
[6]   Capturing security requirements for software systems [J].
El-Hadary, Hassan ;
El-Kassas, Sherif .
JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) :463-472
[7]  
Eyadat M. S., 2018, ASIAN J COMPUT INF S, V6
[8]  
Filippidis Adam P., 2018, 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), DOI 10.1109/MOCAST.2018.8376578
[9]   When Software Engineering meets Cybersecurity at the classroom [J].
Gonzalez, Hugo ;
Llamas-Contreras, Rafael ;
Montano-Rivas, Omar .
2019 7TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2019), 2019, :49-54
[10]   Riskio: A Serious Game for Cyber Security Awareness and Education [J].
Harta, Stephen ;
Margheri, Andrea ;
Paci, Federica ;
Sassonea, Vladimiro .
COMPUTERS & SECURITY, 2020, 95