Application Software Cybersecurity Scanning
Application Software Cybersecurity Scanning
dc.contributor.author | Barner, Lyle | |
dc.date.accessioned | 2019-01-03T00:59:51Z | |
dc.date.available | 2019-01-03T00:59:51Z | |
dc.date.issued | 2019-01-08 | |
dc.description.abstract | Scanning software applications for cybersecurity vulnerabilities is a crucial step is assessing the overall health of the application, but how can this kind of scan be performed to give development teams the information they need to make informed design decisions? Two pilot cybersecurity scans were conducted in an attempt to answer this question. A scanning team composed of various subject matter experts was established and worked closely with the development team to perform these scans and capture metrics throughout the process. These interactions and metrics indicate that these scans can be performed in an unobtrusive way and still provide valuable information to development teams regarding the health of their application. This work is not definitive in nature but serves as a foundation for future work. | |
dc.format.extent | 10 pages | |
dc.identifier.doi | 10.24251/HICSS.2019.884 | |
dc.identifier.isbn | 978-0-9981331-2-6 | |
dc.identifier.uri | http://hdl.handle.net/10125/60172 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 52nd Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | High-Stakes IS Risk and Decision-Making | |
dc.subject | Software Technology | |
dc.subject | cybersecurity, static analysis | |
dc.title | Application Software Cybersecurity Scanning | |
dc.type | Conference Paper | |
dc.type.dcmi | Text |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 0732.pdf
- Size:
- 340.06 KB
- Format:
- Adobe Portable Document Format
- Description: