Current advances in computing, networking and software technology will lead to the development of cyberspace (“cloud”) services that are ubiquitous and will revolutionize all aspects of our life. The delivery of these services will require cyberspace resources that are highly resilient. This presentation will review the development of a Resilient Cloud Services (RCS) Methodology. RCS…
Series: CSIAC Webinars
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
Subscribe to receive an email notification when registration is open for new webinars.
Cyber Information Sharing and Public Policy
The US Senate is currently debating a vote on its thirteenth major cybersecurity information sharing bill. It is important to understand why the government is being so persistent pursuing such policy and why the previous twelve bills have failed. The reasons to pursue such a bill can be compared to the reasons that we have…
Using Unified Code Count (UCC) for Data Collection
Understanding the software development process and gathering data and metrics on the process is an important step to making better-informed cost and effort estimates, improving processes, and making good decisions. UCC (Unified Code Count) is a comprehensive SLOC (software lines of code) counter, and also provides metrics such as Cyclomatic Complexity and difference metrics between…
Cloud Attacks, Threats, and Defenses
As organizations migrate critical services to the cloud, adversaries gain increasing incentive to gain access to these environments. Attacks against cloud environments can range from traditional exploits against an instance to complex, low-level attacks against the underlying infrastructure. This webinar will provide an overview of cloud attacks, drawing directly upon expertise demonstrating vulnerabilities in these…
Cloud Computing and the Government Sector Understanding the Cloud Architecture and Requirements
Adoption of cloud computing requires a thorough understanding of its purpose, characteristics, underlying technologies, service models, and the standards that govern its deployment. This webinar will discuss the fundamental features of cloud computing, service models, deployment models, business models, and provide a brief overview of major providers. Further discussion will focus on the interpretation and…
The Building Security In Maturity Model (BSIMM)
The Building Security In Maturity Model (BSIMM, pronounced “bee simm”) is designed to help you understand, measure, and plan a software security initiative. The BSIMM-V was created by observing and analyzing real-world data from sixty-seven software security initiatives. It is freely available and is licensed under the Creative Commons Attribution-Share Alike 3.0 License. The BSIMM…
Heartbleed: Making On-line Security Popular with the Masses
On April first 2014, a severe flaw in an OpenSSL cryptographic library was publicly announced. Unfortunately, this was no April Fool’s joke and the vulnerability proceeded to capture the attention of security professionals and average internet users alike. This webinar will discuss the details of the vulnerability, how it affects the average internet user, and…
Certifying Security Testers
Recent significant security failures – affecting commercial, educational, and government systems – highlight the damage caused by inadequate cybersecurity. Such risks can be reduced through more thoughtful design and implementation of critical systems, but appraisals are also necessary to provide adequate confidence in these systems. Testing is a key appraisal activity. This presentation starts with…
An Architecture-centric Virtual Integration Strategy to Safety-Critical System Verification
As safety-critical systems have become more software-reliant, verification of such system has become an increasing challenge, as evidenced exponential increase in verification related software rework cost. Industry studies show that 70% of defects are introduced in requirements and architecture design, while 80% are discovered post-unit test, with up to 80% of system functionality dealing with…
Software Cost Estimation Metrics Online Manual
The Software Cost Estimation Metrics Manual is now available in an online version. This presentation discusses taking DoD’s Software Resource Data Reports and creating productivity benchmarks and cost / schedule estimating relationships. This latest edition of the manual discusses what data to collect for creating cost and schedule estimating relationships (small models that estimate project…