Matches in SemOpenAlex for { <https://semopenalex.org/work/W2904829028> ?p ?o ?g. }
Showing items 1 to 63 of
63
with 100 items per page.
- W2904829028 abstract "Based on the calculated cost of a lost record, Yahoo, who “lost” 3 billion records, would be in debt for 450 BILLION DOLLARS. What drives organizations to seek better methods to protect data? The cost of losing data can be high, and it will get higher. Large organizations are able to withstand the malware onslaught, small and mid-size companies have 50-50 chance of remaining in business. To reduce the damage caused by malware, organizations are investing in technology and research. Current research in supervised machine learning is promising. Small and mid-sized companies do not have security professionals to maintain and monitor them. Another area of research is “Honeypots” and “Red Flags”. These techniques may work in espionage, but “white hat testers” demonstrate that these traps are recognized and avoided. Organizations guilty of a data breach, even with clear evidence of negligence are seldom prosecuted. It is very rare that civil or criminal charges are brought against those negligent of reasonable efforts. Can the current environment change? New technologies will eventually be available for small and mid-sized organizations. Laws are changing to make senior management culpable for negligence in protecting sensitive data. Organizations need another way to protect against a data breach. An alternate, and easier strategy for fighting malware is to write software more difficult to hack. This research is identifying how current software practices, lessons learned from malware software, and a novel method to identify critical code, can reduce successful malware attacks. The objective of the research is to search for and identify critical sections in code that should be modified for reducing vulnerabilities. The critical application logic is identified and alternate designs are implemented making it more difficult for the malware author to locate and modify. This research examines easy processes to learn and apply. The work is applicable for all organization, but the existing focus is on helping small and mid-sized organizations. A goal is to reduce the complexity in designing more secure software. The primary considerations are that there are only small additional burdens on software designers and that management sees business value for supporting and requiring more secure software. Because small and mid-sized organizations are more tightly integrated into the supply chain, it the in the interest of large organization, government agencies and the public that these small and mid-sized organizations create more secure software. With an increasing shortage of cyber security professionals, the short-term alternative is to better train software developers for designing more secure software." @default.
- W2904829028 created "2018-12-22" @default.
- W2904829028 creator A5041134084 @default.
- W2904829028 date "2018-10-01" @default.
- W2904829028 modified "2023-09-26" @default.
- W2904829028 title "Secure Software by Design" @default.
- W2904829028 cites W2003043151 @default.
- W2904829028 cites W2598776453 @default.
- W2904829028 cites W2748076757 @default.
- W2904829028 cites W2752660586 @default.
- W2904829028 cites W2887954984 @default.
- W2904829028 doi "https://doi.org/10.1109/ths.2018.8574188" @default.
- W2904829028 hasPublicationYear "2018" @default.
- W2904829028 type Work @default.
- W2904829028 sameAs 2904829028 @default.
- W2904829028 citedByCount "0" @default.
- W2904829028 crossrefType "proceedings-article" @default.
- W2904829028 hasAuthorship W2904829028A5041134084 @default.
- W2904829028 hasConcept C108827166 @default.
- W2904829028 hasConcept C144133560 @default.
- W2904829028 hasConcept C165609540 @default.
- W2904829028 hasConcept C17744445 @default.
- W2904829028 hasConcept C184356942 @default.
- W2904829028 hasConcept C191267431 @default.
- W2904829028 hasConcept C199360897 @default.
- W2904829028 hasConcept C199539241 @default.
- W2904829028 hasConcept C2777904410 @default.
- W2904829028 hasConcept C38652104 @default.
- W2904829028 hasConcept C41008148 @default.
- W2904829028 hasConcept C541664917 @default.
- W2904829028 hasConcept C84525096 @default.
- W2904829028 hasConcept C86844869 @default.
- W2904829028 hasConceptScore W2904829028C108827166 @default.
- W2904829028 hasConceptScore W2904829028C144133560 @default.
- W2904829028 hasConceptScore W2904829028C165609540 @default.
- W2904829028 hasConceptScore W2904829028C17744445 @default.
- W2904829028 hasConceptScore W2904829028C184356942 @default.
- W2904829028 hasConceptScore W2904829028C191267431 @default.
- W2904829028 hasConceptScore W2904829028C199360897 @default.
- W2904829028 hasConceptScore W2904829028C199539241 @default.
- W2904829028 hasConceptScore W2904829028C2777904410 @default.
- W2904829028 hasConceptScore W2904829028C38652104 @default.
- W2904829028 hasConceptScore W2904829028C41008148 @default.
- W2904829028 hasConceptScore W2904829028C541664917 @default.
- W2904829028 hasConceptScore W2904829028C84525096 @default.
- W2904829028 hasConceptScore W2904829028C86844869 @default.
- W2904829028 hasLocation W29048290281 @default.
- W2904829028 hasOpenAccess W2904829028 @default.
- W2904829028 hasPrimaryLocation W29048290281 @default.
- W2904829028 hasRelatedWork W2594153842 @default.
- W2904829028 hasRelatedWork W2904829028 @default.
- W2904829028 hasRelatedWork W3015589358 @default.
- W2904829028 hasRelatedWork W3027821577 @default.
- W2904829028 hasRelatedWork W3083132081 @default.
- W2904829028 hasRelatedWork W3135367783 @default.
- W2904829028 hasRelatedWork W4206698438 @default.
- W2904829028 hasRelatedWork W4241237415 @default.
- W2904829028 hasRelatedWork W4289450884 @default.
- W2904829028 hasRelatedWork W43384612 @default.
- W2904829028 isParatext "false" @default.
- W2904829028 isRetracted "false" @default.
- W2904829028 magId "2904829028" @default.
- W2904829028 workType "article" @default.