Show simple item record

dc.contributor.authorTerkelsen, Harald
dc.date.accessioned2008-03-28T08:51:56Z
dc.date.issued2006
dc.identifier.urihttp://hdl.handle.net/11250/144046
dc.description.abstractProducing secure software is extremely hard to do right. The number of security flaws and vulnerabilities discovered in software each day is increasing at high speed. According to the National Vulnerability Database the number of vulnerabilities discovered in 2005 was 4859, more than twice the number of vulnerabilities discovered the year before. One way to classify vulnerabilities is to classify them after when in the development phase they are introduced. Other phases like analysis (requirements), testing, or maintenance phase are also sometimes used. This thesis is a study of security related flaws with origin in the design phase. Such flaws are rooted in the design of the software, and exist even if the programmer implements the design perfectly making no mistakes in the programming. Security related design flaws are a lot about how security mechanisms like authentication, authorization and encryption are used and implemented, or how error handling is performed. Typical examples of design flaws include weak encryption, missing or insufficient access control.en
dc.format.extent626282 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoengen
dc.subjectdatasikkerheten
dc.subjectsikkerheten
dc.subjectdesignen
dc.titleData collection on security flaws caused by design errorsen
dc.typeMaster thesisen
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record