The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2016 vol. 33)
ISSN: 0740-7459
pp: 24-28
Jane Cleland-Huang , DePaul University
Tamara Denning , University of Utah
Tadayoshi Kohno , University of Washington
Forrest Shull , Software Engineering Institute
Samuel Weber , Software Engineering Institute
ABSTRACT
Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podcast of author Jane Cleland-Huang reading her column.
INDEX TERMS
software engineering, threat analysis, software requirements, software security, Security Cards, implantable cardioverter-defibrillator, ICD, software development
CITATION

J. Cleland-Huang, T. Denning, T. Kohno, F. Shull and S. Weber, "Keeping Ahead of Our Adversaries," in IEEE Software, vol. 33, no. 3, pp. 24-28, 2016.
doi:10.1109/MS.2016.75
162 ms
(Ver 3.1 (10032016))