01. Principles

Security is a process, not a product

Bruce Schneier

Course

SENG406: brand-new course.

Assessment items:

Description Marks Due date
OWASP threat model (small groups) 10% Week 4
Secure coding (improved codebase from lab) 20% Week 6
Literature review (individual) 20% Week 8
Security audit (open source software) 20% Week 12
Final exam (in-person) 30% N/A

Exam will cover mainly content covered in class. Additional resources covered in class are examinable.

Lecture content:

Weeks 11, 12: time for final assignment.

Labs:

Software security is different from software engineering in general in that new attacks, threat vectors, and actors are coming out all the time, making it critical that we stay up to date. We must be proactive and ensure we are constantly monitoring the systems.

This course is about:

It is not about:

Log4j:

Group discussion

Scenario:

Vulnerability discovered in GPS library (fix ready, assume similar to log4j):

  1. What information do you need to evaluate the impact of the vulnerability?
  1. What action plan would you put in place?
  1. Postmortem

Step 1, first response:

Step 2, communication:

Step 3, postmortem:

Security Engineering

Six goals:

Terminology:

Security violations and attacks:

Risk assessment: