Hunting for aardvarks: Can software security be measured?

16Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

When you are in charge of building software from the ground up, software security can be encouraged through the use of secure software development methodologies. However, how can you measure the security of a given piece of software that you didn't write yourself? In other words, when looking at two executables, what does "a is more secure than b" mean? This paper examines some approaches to measuring software security, and reccommends that more organisations should employ the Building Security In Maturity Model (BSIMM). © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Jaatun, M. G. (2012). Hunting for aardvarks: Can software security be measured? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7465 LNCS, pp. 85–92). https://doi.org/10.1007/978-3-642-32498-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free