The challenges of componentization for security and team formation
DOI:
https://doi.org/10.5753/compbr.2024.52.4602Keywords:
Cybersecurity, componentization, best practices, trainingAbstract
This article explores the key theoretical and practical factors influencing the construction and maintenance of cybersecurity in component-based systems, along with their correlations to team training. Over the past 25 years, significant shifts in development paradigms have led to a landscape of excessive software abstraction and "disposable" systems, which young professionals fresh out of academia must navigate. This environment challenges the holistic technical perspective needed to design, implement, and maintain secure components and systems. The article offers best practices and recommendations for integrating effective methodologies into the training of individuals and teams to address these challenges.
Downloads
References
Len Bass, Paul Clements e Rick Kazman, “Software Architecture in Practice”, 4ª Edição, agosto de 2021.
Yen, Hsu-Chun. “On the Regularity of Petri Net Languages.” Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications (1994): 329.
A. M. Mir, M. Keshani and S. Proksch, “On the Effect of Transitivity and Granularity on Vulnerability Propagation in the Maven Ecosystem,” 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Taipa, Macao, 2023, pp. 201-211, DOI: 10.1109/SANER56733.2023.00028.
M. Ullah Khan, M. Munib, U. Manzoor and S. Nefti, “Analyzing risks at architectural level,” International Conference on Information Society (i-Society 2011), London, UK, 2011, pp. 231-236, DOI: 10.1109/i-Society18435.2011.5978442.
Kou, K., Jeong, J., & Lee, G. (2008). Definition of Evaluation Assurance Levels and Estimation of Evaluation Efforts for Operational System Based ISO/IEC 19791. 2008 International Conference on Security Technology, 176-183. DOI: 10.1109/SECTECH.2008.41
Gallo, R., Dahab, R. (2015). Assurance Cases as a Didactic Tool for Information Security. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds) Information Security Education Across the Curriculum. WISE 2015. IFIP Advances in Information and Communication Technology, vol 453. Springer, Cham. DOI: 10.1007/978-3-319-18500-2_2
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.