Hidden Risks to Cyberspace Security from Obsolete COTS Software.
Barls Egemen ÖzkanSerol BulkanPublished in: CyCon (2019)
Keyphrases
- software components
- security risks
- risk analysis
- intrusion detection
- security vulnerabilities
- software systems
- information security
- software development
- software tools
- software design
- security issues
- risk assessment
- third party
- network security
- access control
- functional requirements
- windows xp
- enterprise systems
- security systems
- network services
- security requirements
- intellectual property protection
- software engineering
- software maintenance
- source code
- software architecture
- development process
- user interface
- decision support
- user friendliness
- building blocks
- security threats
- security level
- limited resources
- embedded systems
- cyber security
- computer security
- risk management
- software developers
- static analysis
- security policies