- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 300字
- 2021-06-10 18:42:34
Verification
Verification is the process that evaluates the implemented product or system to ensure it matches the intended design. Frequently, this process is also accompanied by validation, a process that checks that the system in question meets the needs of one or more stakeholders.
Depending on the type of system being developed, there may be many different test events. For example, some types of products may have to undergo extensive environmental testing to ensure the product can operate in harsh conditions (such as space, or the desert).
Some security products may have to undergo independent lab testing such as Common Criteria (CC) validation or Federal Information Processing Standards (FIPS) 140-2 validation for cryptographic modules.
Security verification and validation should be based on tests documented within a security test plan and procedures document, and the security requirements should be defined and tracked in the SRTM. Sufficient testing needs to be conducted, both positive and negative, to verify that functional security requirements have been satisfied.
Discrepancy Reports (DRs) should be created whenever issues are identified; those DRs should be tracked to closure by development teams as the system is updated and new releases are made available. Tracking of DRs can be performed with a variety of tracking tools, from formal configuration management tools such as DOORS to Agile-based tools such as Jira in the Atlassian suite.
Given the holistic and dynamic nature of security threats and the emergence of new risks, a classic waterfall design approach for implementing security is clearly insufficient. New attacks and countermeasures emerge at such a feverish pace today that much more responsive methods are generally needed.
That said, if your device or system is a completely closed system—clearly the antithesis of the IoT—then some facets of waterfall security engineering may suffice.
- Node Security
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- unidbg逆向工程:原理與實踐
- CTF實戰(zhàn):技術(shù)、解題與進(jìn)階
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- Preventing Digital Extortion
- 數(shù)據(jù)安全與隱私計算(第3版)
- 數(shù)據(jù)安全領(lǐng)域指南
- CTF那些事兒
- Mastering Reverse Engineering
- 編譯與反編譯技術(shù)實戰(zhàn)
- 實用黑客攻防技術(shù)
- ATT&CK與威脅獵殺實戰(zhàn)
- CTF網(wǎng)絡(luò)安全競賽入門教程
- BeagleBone for Secret Agents