BEGIN:VCALENDAR VERSION:2.0 PRODID:-//jEvents 2.0 for Joomla//EN CALSCALE:GREGORIAN METHOD:PUBLISH BEGIN:VEVENT UID:17c2ea1b381668558737a2842b477831 CATEGORIES:Lectures & Presentations CREATED:20131118T220415 SUMMARY:Tutorial Jungwoo Ryoo: Secure Software LOCATION:SBA Research gGmbH - Wien DESCRIPTION:Guest tutorial Jungwoo Ryoo: Foundations, Design and Management of Secure S oftwareSoftware security is becoming increasingly important due to numerous emerging threats exploiting software vulnerabilities.\nThis course begins with a broad overview of various software security threats and some of the most effective countermeasures used to thwart them. More specifically, soft ware practitioners will learn how to build security into their software pro ducts throughout their lifecycle, using best practices and tools to minimiz e the chance of falling victim to a software attack.\nThis course will also provide a comprehensive coverage of practical knowledge in how to design s ecure software as well as insights on the significance of the role secure d esign plays during the software development life cycle. Some of the critica l topics covered in this course include secure design principles and proces ses in addition to fundamental security concepts such as access control and encryption. This course also devotes a significant amount of time to discu ssing well-known secure design solutions, including architectural patterns and design patterns focusing on security countermeasures and concludes with the discussion of software security analysis and evaluation as mechanisms to assess the effectiveness of the secure design solutions implemented in t he form of source code.\n*******\nJungwoo Ryoo is an associate professor of Information Sciences and Technology (IST) at the Pennsylvania State Univer sity-Altoona. Dr. Ryoo is also a graduate/affiliated faculty member of the college of IST (http://ist.psu.edu/directory/jxr65) at Penn State. He is a technical editor a> for the IEEE Communications Magazine (http://www.comsoc.org/commag/) and working with IEEE and Software Engineeri ng Institute (SEI) as a consultant. His research interests include info rmation assurance and security, software engineering, and computer networki ng. He is the author of numerous academic articles and conducts extensive r esearch in software security, network/cyber security, security management ( particularly in the government and medical sector), software architectures, architecture description languages (ADLs), object-oriented software develo pment, formal methods and requirements engineering. Many of Dr. Ryoo's rese arch projects have been funded by both state and federal government agencie s. He also has substantial industry experience in architecting and implemen ting secure, high-performance software for large-scale network management s ystems. He received his Ph.D. in Computer Science (http://eecs.ku.edu/) fro m the University of Kansas in 2005.\n X-ALT-DESC;FMTTYPE=text/html:
Software security is becoming increasingly important due to numerous emerging threats exploiting software vulnerabilities.
< p>T his course begins with a broad overview of various software security threat s and some of the most effective countermeasures used to thwart them. More specifically, software practitioners will learn how to build security into their software products throughout their lifecycle, using best practices an d tools to minimize the chance of falling victim to a software attack.This course will also provide a comprehensive coverage of practical k nowledge in how to design secure software as well as insights on the signif icance of the role secure design plays during the software development life cycle. Some of the critical topics covered in this course include secure d esign principles and processes in addition to fundamental security concepts such as access control and encryption. This course also devotes a signific ant amount of time to discussing well-known secure design solutions, includ ing architectural patterns and design patterns focusing on security counter measures and concludes with the discussion of software security analysis an d evaluation as mechanisms to assess the effectiveness of the secure design solutions implemented in the form of source code.
*******
Jungwoo Ryoo is an associate professor of Information
Sciences and Technology (IST) at the Pennsylvania State University-Altoona
. Dr. Ryoo is also a graduate/affiliated faculty member of the college of IST<
/a>
at Penn State. He is a technical editor for the IEEE Communications Magazine and working with IEEE and Software Engineering Institute (SEI)