The challenges of componentization for security and team formation

Authors

  • Roberto Gallo State University of Campinas

DOI:

https://doi.org/10.5753/compbr.2024.52.4602

Keywords:

Cybersecurity, componentization, best practices, training

Abstract

This article explores the key theoretical and practical factors influencing the construction and maintenance of cybersecurity in component-based systems, along with their correlations to team training. Over the past 25 years, significant shifts in development paradigms have led to a landscape of excessive software abstraction and "disposable" systems, which young professionals fresh out of academia must navigate. This environment challenges the holistic technical perspective needed to design, implement, and maintain secure components and systems. The article offers best practices and recommendations for integrating effective methodologies into the training of individuals and teams to address these challenges.

Downloads

Download data is not yet available.

References

Len Bass, Paul Clements e Rick Kazman, “Software Architecture in Practice”, 4ª Edição, agosto de 2021.

Yen, Hsu-Chun. “On the Regularity of Petri Net Languages.” Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications (1994): 329.

A. M. Mir, M. Keshani and S. Proksch, “On the Effect of Transitivity and Granularity on Vulnerability Propagation in the Maven Ecosystem,” 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Taipa, Macao, 2023, pp. 201-211, DOI: 10.1109/SANER56733.2023.00028.

M. Ullah Khan, M. Munib, U. Manzoor and S. Nefti, “Analyzing risks at architectural level,” International Conference on Information Society (i-Society 2011), London, UK, 2011, pp. 231-236, DOI: 10.1109/i-Society18435.2011.5978442.

Kou, K., Jeong, J., & Lee, G. (2008). Definition of Evaluation Assurance Levels and Estimation of Evaluation Efforts for Operational System Based ISO/IEC 19791. 2008 International Conference on Security Technology, 176-183. DOI: 10.1109/SECTECH.2008.41

Gallo, R., Dahab, R. (2015). Assurance Cases as a Didactic Tool for Information Security. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds) Information Security Education Across the Curriculum. WISE 2015. IFIP Advances in Information and Communication Technology, vol 453. Springer, Cham. DOI: 10.1007/978-3-319-18500-2_2

Published

2024-06-11

How to Cite

Gallo, R. (2024). The challenges of componentization for security and team formation. Brazil Computing, (52), 43–50. https://doi.org/10.5753/compbr.2024.52.4602

Issue

Section

Papers