skip to main content
10.1145/3230833.3233276acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Challenges and mitigation approaches for getting secured applications in an enterprise company

Authors Info & Claims
Published:27 August 2018Publication History

ABSTRACT

For years many companies have paid attention to making sure infrastructure is protected adequately while making applications secured was underestimated. This approach is changing nowadays, but according to many security research companies (like WhiteHat or Gartner) a lot of vulnerabilities are still present in applications. Those vulnerabilities are on different levels like architecture or code and they have multiple sources like wrong requirements, processes, tools, unskilled developers or everything at the same time. In the paper we present the challenges that were discovered when we applied some mitigation approaches during the security journey in an enterprise company in the automotive industry.

References

  1. Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M. (2003). Enterprise privacy authorization language (EPAL). IBM Research.Google ScholarGoogle Scholar
  2. Computer Business Review, Top 5 critical infrastructure cyber attacks, Available: https://www.cbronline.com/cybersecurity/top-5-infrastructure-hacks/ {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  3. Stuart Broderick, Top 5 Success Factors for Cybersecurity Management Programs, CISCO Blogs, 2015 https://blogs.cisco.com/security/top-5-success-factors-for-cybersecurity-management-programsGoogle ScholarGoogle Scholar
  4. Certified Information Systems Security Professional (CISSP). Available: https://www.isc2.org/Certifications/CrSSP {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  5. ISO/IEC 27000 family - Information security management systems. Available: https://www.iso.org/isoiec-27001-information-security.html {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  6. Open Security Architecture. Available: http://www.opensecurityarchitecture.org/cms/ {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  7. OWASP, Application Security Verification Standard, 2016. Available: https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  8. NIST CyberSecurity Framework. Available: https://www.nist.gov/cyberframework {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  9. SABSA. Available: http://www.sabsa.org/ {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  10. Reihaneh Amel Sadeghi, Identifying Key Success Factors in the Implementation of Information Security Systems on Service Businesses: A Case Study of the Private Banks of Tehran, American Journal of Theoretical and Applied Business, 2 (4), 28--37, 2016Google ScholarGoogle Scholar
  11. John Sherwood, Andrew Clark, David Lynas, Enterprise Security Architecture: A Business-Driven Approach, CRC Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Marianne Swanson et al. Contingency Planning Guide for Federal Information Systems, NIST, 2010Google ScholarGoogle Scholar
  13. Yasar, H. (2017). Implementing Secure DevOps assessment for highly regulated environments. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 70). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. World's Biggest Data Breaches, Available: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ {Accessed: 29.06.2018}Google ScholarGoogle Scholar
  15. Vinh, T. V., Grewal, D. Critical success factors of effective security management: a survey of Vietnamese maritime transport service providers. In International Association of Maritime Universities (IAMU) 6th Annual General Assembly and Conference, ed. D. Nielsen, World Maritime University, Sweden (Vol. 10, pp. 24--26), 2005Google ScholarGoogle Scholar

Index Terms

  1. Challenges and mitigation approaches for getting secured applications in an enterprise company

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
            August 2018
            603 pages
            ISBN:9781450364485
            DOI:10.1145/3230833

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader