{"id":293,"date":"2022-05-16T23:28:06","date_gmt":"2022-05-16T23:28:06","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/05\/16\/software-security-for-the-people\/"},"modified":"2022-05-16T23:28:06","modified_gmt":"2022-05-16T23:28:06","slug":"software-security-for-the-people","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/05\/16\/software-security-for-the-people\/","title":{"rendered":"Software Security for the People"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>IEEE Computer Society Team<\/p>\n<\/p><\/div>\n<div>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-276657 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/05\/16232150\/software-security.jpg\" alt=\"software security\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/05\/16232150\/software-security.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/05\/16232150\/software-security-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/05\/16232150\/software-security-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>The rising demand for security traverses all sectors of the software industry\u2014and expands to include end-users, government organizations, academia, and so on. Recent statistics show that besides a rise in cybercrime targeting networks and systems, <u>over 30% of companies<\/u> detected attempts to exploit vulnerabilities found in software. This underscores the need to train developers with the skills to design, write, test, and assess code to make software resistant to being exploited.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<h2>The Need for Training<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">With <u>over 4 million software engineers<\/u> in the US and a <u>compound annual growth rate of 4%<\/u>, software is available in abundance. But an understanding of the vulnerabilities and potential for exploitation has not increased commensurately. When addressing cybersecurity strategies and policies, most organizations focus on their networks and hardware, and inadequate attention is given to the role of software security in a company\u2019s cybersecurity posture.<\/p>\n<h2>The Resources and Methods<\/h2>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">The key to providing comprehensive training is to formulate a curriculum with the right approach, components, and delivery.<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; line-height: 1.7em;\">\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\"><strong>Approach.<\/strong> The approach should include putting materials together that can reach the broadest audience. It should be based on spanning the technical depth and breadth of the industry, as well as crossing cultural and linguistic boundaries.<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\"><strong>Components.<\/strong> In harmony with the development of the approach, components such as visual aids, multi-language closed captioning of video lectures, resources for the instructors, and interactive exercises must be included. There also needs to be an effective means for periodic evaluation and assessment of trainees.<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\"><strong>Delivery. <\/strong>Methods of delivery need to reflect the needs of the widest audience possible, so there would need to be provisions for classroom learning to focus on students, as well as professional training courses for your existing workforce, motivational lectures for workshops, and supplemental video lectures to support your instructors.<\/li>\n<\/ul>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">To get an overview of the current software security curriculum ecosystem, download and read the complete article, \u201c<u>Software Security for the People: Free and Open Resources for Software Security Training<\/u>\u201d by Elisa R. Heymann and Barton P. Miller, first appearing in the IEEE Security &amp; Privacy Magazine in March-April 2022.<\/p>\n<\/p><\/div>\n<p><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '2406379906149876');\n  fbq('track', 'PageView');\n<\/script><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '721875948349197');\n  fbq('track', 'PageView');\n<\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/build-your-career\/free-resources-for-software-security-training\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] IEEE Computer Society Team The rising demand for security traverses all sectors of the software industry\u2014and expands to include&hellip;<\/p>\n","protected":false},"author":1,"featured_media":294,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,62,2],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-software","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/294"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}