Sse CS 4
Sse CS 4
Engineering
BITS Pilani Dr Sunil Dhore
Pilani Campus
BITS Pilani
Pilani Campus
Course :
Secure Software Engineering
Lecture No. 4
IMP Note to Self
3
Disclaimers
❖ The slides presented here are obtained from various authors of books, online
❖ The content is suitably modified for this sake of conducting this course
❖ I acknowledge, appreciate and thank all the authors of the content am reusing
4
M1: Overview of Secure Software Engineering
• Why Secure Software Engineering ?
• Popular Cyber attacks on Software, Hardware and Cloud
delivered products.
• Core definitions, concepts, examples.
• Differences Product Security versus Security Products
Text Book(s)
T1 Secure, Resilient, and Agile Software Development By Mark Merkow · 2019
T2 Core Software Security Security at the Source By James Ransome, Anmol Misra · 2018
T3 Secure and Resilient Software Requirements, Test Cases, and Testing Methods
By Mark S. Merkow, Lakshmikanth Raghavan · 2011
BITS Pilani, Pilani Campus
Evaluation Scheme
Legend: EC = Evaluation Component
Note - Evaluation components can be tailored depending on the proposed model.
Security Perimeter
https://www.sangfor.com/glossary/cybersecurity/what-is-security-
perimeter#:~:text=The%20boundary%20that%20divides%20a,gates%20that%20block%
20access%20physically.
Security Perimeter
Attack Surface
https://graquantum.com/cyber-basics-cyber-attack-surface/
Attack Surface
All the web pages the attacker (Internal or External) can access,
either directly or forcibly
• User interface (UI) forms and fields
• HTTP headers and cookies
• APIs
• Files
• Databases
• Other local storage
• Email or other kinds of messages
• Runtime arguments
• ...Your points of entry/exit
Threat Modelling
https://www.cisco.com/c/en/us/products/security/what-is-threat-modeling.html
Threat Modelling
Prioritize
Identify Identify
Assess Risks Mitigation
Assets Threats
Efforts
Data flow diagram with data storage, data flows, function and interface
Review : https://blog.hubspot.com/marketing/data-flow-diagram
https://www.cisco.com/c/en/us/products/security/what-is-threat-
modeling.html
• https://cloudsecurityalliance.org/research/topics/top-
threats/
• https://cloudsecurityalliance.org/artifacts/top-threats-to-
cloud-computing-egregious-eleven/
• https://cloudsecurityalliance.org/artifacts/top-threats-
egregious-11-deep-dive/
https://www.threatmodelingmanifesto.org/
BITS Pilani, Pilani Campus
IMP Note to Self
48
BITS Pilani
Pilani | Dubai | Goa | Hyderabad
Thank You !!