Issue No. 03 - May-June (2016 vol. 33)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MS.2016.75
Jane Cleland-Huang , DePaul University
Tamara Denning , University of Utah
Tadayoshi Kohno , University of Washington
Forrest Shull , Software Engineering Institute
Samuel Weber , Software Engineering Institute
Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podcast of author Jane Cleland-Huang reading her column.
software engineering, threat analysis, software requirements, software security, Security Cards, implantable cardioverter-defibrillator, ICD, software development
J. Cleland-Huang, T. Denning, T. Kohno, F. Shull and S. Weber, "Keeping Ahead of Our Adversaries," in IEEE Software, vol. 33, no. 3, pp. 24-28, 2016.