SlideShare a Scribd company logo
Engineering Security Vulnerability
Prevention, Detection, and Response
IEEE Software ( Volume: 35 , Issue: 5 , September/October 2018 )
Group Member(s):
Areeba Jabeen
Hafsa Habib
Muniba Javaid
Software Security
Software engineers use software security practices to
• Prevent the introduction of vulnerabilities into a product or system,
• Detect vulnerabilities that have been injected during development,
• Respond to the discovery of vulnerabilities in a deployed product by
attackers and researchers.
Software Vulnerability
A software vulnerability is a glitch, flaw, or weakness present in
the software which helps the attacker to perform unauthorized actions
within a computer system.
Vulnerability Prevention
Two practices are commonly used in Firms / Organizations to prevent the
injection of vulnerabilities:
• Design flaw prevention practices
• Implementation bug prevention practices
Design flaw prevention practices
 Build and publish security features
 Create security standards
 Create (security) policy
 Identify potential attackers
 Use application containers
 Create technology-specific attack
patterns
Implementation bug prevention practices
 Use a top-N bugs list
 Use secure coding standards.
Vulnerability Detection
Vulnerability detection practices are used to find implementation bugs
and design flaws in a product prior to its deployment to a customer.
To be protected, the entire system should be monitored. Intrusion
detection tools should be strategically placed at the network and
application levels.
Intrusion detection system (IDS)
An intrusion detection system (IDS) is a tool or software that works
with your network to keep it secure and flag when somebody is trying
to break into your system.
Some popular IDS Software Tools are: SolarWinds Security Event
Manager, Snort, Suricata, Trend Micro TippingPoint, Cisco
Stealthwatch
Vulnerability Detection
Two practices are commonly used in Firms / Organizations for the
detection of vulnerabilities:
• Design flaw detection practices
• Implementation bug detection practices
Implementation bug detection practices
 Use external penetration testers to
find problems.
 Ensure that quality assurance (QA)
supports edge or boundary value
condition testing.
 Use penetration testing tools
internally.
 Use automated tools along with a
manual review.
Design flaw detection practices
 Use external penetration testers to
find problems.
 Perform a security feature review.
 Use penetration testing tools
internally.
 Perform a design review for high-risk
applications.
Vulnerability Response
Six software security practices are used to detect a breach or to
respond to the detection of vulnerabilities once the product is
deployed.
The three practices used most often deal with emergency responses
and bug fixing.
 Create or interface with incident response.
 Track software bugs found in operations through the fix process.
 Have an emergency code base response.
The lowest-used practices are focused on proactive actions, such as
fixing all occurrences of bugs.
 Use application input monitoring.
 Use application behavior monitoring and diagnostics.
 Fix all occurrences of software bugs found in operations.
CONCLUSION
Software engineers and security researchers must continue to rise to protect
society from the attackers.
 Engineers should explicitly consider the bad actors for their systems and
what these actors want to do, such that the system can stop them in their
tracks using practices such as abuse cases and threat models.
 Engineers should also consider the unintentional mistakes that users can
make, such as clicking on suspicious links, and design systems to protect
the user from his or her own actions.
Providing tools to aid in software security is not enough. Students and
practitioners need to be trained. Educators of software engineers should
ensure that students learn the importance of and the practices for designing
and developing secure systems.
Thank you...

More Related Content

PDF
EC-Council Certified Secure Computer User C|SCU Program
PPT
Classical cryptography
PPT
Counter Measures Of Virus
PPT
Information security
PDF
IBM 보안솔루션 앱스캔_App Scan Source Edition
PPT
Information and data security digital signatures
PDF
Mobile Application Security Testing
EC-Council Certified Secure Computer User C|SCU Program
Classical cryptography
Counter Measures Of Virus
Information security
IBM 보안솔루션 앱스캔_App Scan Source Edition
Information and data security digital signatures
Mobile Application Security Testing

What's hot (20)

PPTX
Cryptography
PPT
data mining for security application
PPTX
Intrusion detection system
PPTX
Public Key Cryptography
PPTX
Threats Intelligence and analysis . pptx
PPT
Elgamal Digital Signature
PPTX
Ağ tabanlı Saldırı Tespit Sistemleri
PPT
Information security awareness
 
PPTX
Buffer overflow
PPTX
Spoofing Techniques
PPT
Performance evaluation of IR models
PPTX
Intrusion detection system
PPTX
Cryptography
PDF
OWASP Mobile Security: Top 10 Risks for 2017
PPTX
Cryptography on cloud
PDF
Mobile Security
PPTX
Intrusion Detection System(IDS)
PPT
Ch02 classic nemo
PPT
IDS and IPS
PPTX
Intrusion detection system
Cryptography
data mining for security application
Intrusion detection system
Public Key Cryptography
Threats Intelligence and analysis . pptx
Elgamal Digital Signature
Ağ tabanlı Saldırı Tespit Sistemleri
Information security awareness
 
Buffer overflow
Spoofing Techniques
Performance evaluation of IR models
Intrusion detection system
Cryptography
OWASP Mobile Security: Top 10 Risks for 2017
Cryptography on cloud
Mobile Security
Intrusion Detection System(IDS)
Ch02 classic nemo
IDS and IPS
Intrusion detection system
Ad

Similar to Engineering Security Vulnerability Prevention, Detection, and Response (20)

PPTX
Information security software security presentation.pptx
PPT
csce201 - software - sec Basic Security.ppt
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPT
Software Security Initiatives
PPT
Software Security in the Real World
PDF
ProdSec: A Technical Approach
PPT
Whittaker How To Break Software Security - SoftTest Ireland
PDF
Security Introspection for Software Reuse
PPT
Software security practices for preventing threats
PDF
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
PPTX
chap-1 : Vulnerabilities in Information Systems
PPTX
Eirtight writing secure code
PPTX
5 Ways to Reduce 3rd Party Developer Risk
PPT
Software Security Testing
PDF
Secure software development.pdf
PPTX
Reduce Third Party Developer Risks
PDF
Software security: Security a Software Issue
PPTX
information system security --internet cyber security
PPT
Chapter 2- Software Security FULL SLIDES.ppt
PPTX
Software Security
Information security software security presentation.pptx
csce201 - software - sec Basic Security.ppt
Information-security and best pracrices tools for the enhanced security of s...
Software Security Initiatives
Software Security in the Real World
ProdSec: A Technical Approach
Whittaker How To Break Software Security - SoftTest Ireland
Security Introspection for Software Reuse
Software security practices for preventing threats
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
chap-1 : Vulnerabilities in Information Systems
Eirtight writing secure code
5 Ways to Reduce 3rd Party Developer Risk
Software Security Testing
Secure software development.pdf
Reduce Third Party Developer Risks
Software security: Security a Software Issue
information system security --internet cyber security
Chapter 2- Software Security FULL SLIDES.ppt
Software Security
Ad

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Digital Strategies for Manufacturing Companies
PPTX
Essential Infomation Tech presentation.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
top salesforce developer skills in 2025.pdf
PPTX
Introduction to Artificial Intelligence
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Nekopoi APK 2025 free lastest update
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
VVF-Customer-Presentation2025-Ver1.9.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
PTS Company Brochure 2025 (1).pdf.......
Digital Strategies for Manufacturing Companies
Essential Infomation Tech presentation.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
top salesforce developer skills in 2025.pdf
Introduction to Artificial Intelligence
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Reimagine Home Health with the Power of Agentic AI​
Understanding Forklifts - TECH EHS Solution
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Nekopoi APK 2025 free lastest update
Lecture 3: Operating Systems Introduction to Computer Hardware Systems

Engineering Security Vulnerability Prevention, Detection, and Response

  • 1. Engineering Security Vulnerability Prevention, Detection, and Response IEEE Software ( Volume: 35 , Issue: 5 , September/October 2018 ) Group Member(s): Areeba Jabeen Hafsa Habib Muniba Javaid
  • 2. Software Security Software engineers use software security practices to • Prevent the introduction of vulnerabilities into a product or system, • Detect vulnerabilities that have been injected during development, • Respond to the discovery of vulnerabilities in a deployed product by attackers and researchers. Software Vulnerability A software vulnerability is a glitch, flaw, or weakness present in the software which helps the attacker to perform unauthorized actions within a computer system.
  • 3. Vulnerability Prevention Two practices are commonly used in Firms / Organizations to prevent the injection of vulnerabilities: • Design flaw prevention practices • Implementation bug prevention practices Design flaw prevention practices  Build and publish security features  Create security standards  Create (security) policy  Identify potential attackers  Use application containers  Create technology-specific attack patterns Implementation bug prevention practices  Use a top-N bugs list  Use secure coding standards.
  • 4. Vulnerability Detection Vulnerability detection practices are used to find implementation bugs and design flaws in a product prior to its deployment to a customer. To be protected, the entire system should be monitored. Intrusion detection tools should be strategically placed at the network and application levels. Intrusion detection system (IDS) An intrusion detection system (IDS) is a tool or software that works with your network to keep it secure and flag when somebody is trying to break into your system. Some popular IDS Software Tools are: SolarWinds Security Event Manager, Snort, Suricata, Trend Micro TippingPoint, Cisco Stealthwatch
  • 5. Vulnerability Detection Two practices are commonly used in Firms / Organizations for the detection of vulnerabilities: • Design flaw detection practices • Implementation bug detection practices Implementation bug detection practices  Use external penetration testers to find problems.  Ensure that quality assurance (QA) supports edge or boundary value condition testing.  Use penetration testing tools internally.  Use automated tools along with a manual review. Design flaw detection practices  Use external penetration testers to find problems.  Perform a security feature review.  Use penetration testing tools internally.  Perform a design review for high-risk applications.
  • 6. Vulnerability Response Six software security practices are used to detect a breach or to respond to the detection of vulnerabilities once the product is deployed. The three practices used most often deal with emergency responses and bug fixing.  Create or interface with incident response.  Track software bugs found in operations through the fix process.  Have an emergency code base response. The lowest-used practices are focused on proactive actions, such as fixing all occurrences of bugs.  Use application input monitoring.  Use application behavior monitoring and diagnostics.  Fix all occurrences of software bugs found in operations.
  • 7. CONCLUSION Software engineers and security researchers must continue to rise to protect society from the attackers.  Engineers should explicitly consider the bad actors for their systems and what these actors want to do, such that the system can stop them in their tracks using practices such as abuse cases and threat models.  Engineers should also consider the unintentional mistakes that users can make, such as clicking on suspicious links, and design systems to protect the user from his or her own actions. Providing tools to aid in software security is not enough. Students and practitioners need to be trained. Educators of software engineers should ensure that students learn the importance of and the practices for designing and developing secure systems.