165
Comment:
|
← Revision 3 as of 2011-11-30 11:38:55 ⇥
1421
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
#acl asker:read,write,delete,revert,admin All:read | |
Line 7: | Line 6: |
90 hp Computer and Systems Sciences with at least 7,5 hp computer security | |
Line 10: | Line 9: |
The aim of the course is to expose the student to a common body of knowledge in the software assurance area. After completing the course the student will will be able to: | |
Line 11: | Line 11: |
* identify common software vulnerabilities, their causes, symptoms, and remedies. * apply secure software design principles, and methods and tools for the secure implementation of those designs. * apply suitable security architectures. * relate to standards of relevance for the area of secure software engineering, in particular to understand the advantages, roles, mechanisms, and difficulties involved in methods for evaluating assurance in security software. |
|
Line 13: | Line 17: |
With the starting point of studies into the problem in terms of known software vulnerabilities, the course then relates the different stages of the software development cycle to measures that can suitably alleviate software vulnerabilities. Assurance criteria evaluation methods are primarily represented by The Common Criteria. In order to gain a broad understanding of the method it is presented through several complementary perspectives. Apart from an historical view over its development it is studied from the point of view of several of the primary beneficiaries of the method. |
Software engineering and security architecture
Requirements
90 hp Computer and Systems Sciences with at least 7,5 hp computer security
Aim
The aim of the course is to expose the student to a common body of knowledge in the software assurance area. After completing the course the student will will be able to:
- identify common software vulnerabilities, their causes, symptoms, and remedies.
- apply secure software design principles, and methods and tools for the secure implementation of those designs.
- apply suitable security architectures.
- relate to standards of relevance for the area of secure software engineering, in particular to understand the advantages, roles, mechanisms, and difficulties involved in methods for evaluating assurance in security software.
Syllabus
With the starting point of studies into the problem in terms of known software vulnerabilities, the course then relates the different stages of the software development cycle to measures that can suitably alleviate software vulnerabilities.
Assurance criteria evaluation methods are primarily represented by The Common Criteria. In order to gain a broad understanding of the method it is presented through several complementary perspectives. Apart from an historical view over its development it is studied from the point of view of several of the primary beneficiaries of the method.