search menu icon-carat-right cmu-wordmark

Secure Software Development Landscape

July 2016 Webinar
Mark Sherman

Examine how security can be introduced throughout the software development lifecycle to blunt vulnerabilities.

Publisher:

Software Engineering Institute

Watch

Abstract

Last summer's Wired article describing vulnerabilities in the Jeep shows that software is being created and deployed with exploitable, yet avoidable, security flaws. So far, the automotive attacks have been largely demonstrations. However, successful cyber-attacks have been carried out on steel furnaces in Germany and the electrical grid in Ukraine. Insecurely written software in cyber-physical systems places people and property in jeopardy. Fortunately, there are many techniques available to those building software for cyber physical systems that can greatly reduce their vulnerability. This talk starts with an in-depth review of the Jeep scenario. It then examines how security can be introduced throughout the software development lifecycle to blunt such vulnerabilities.