WIBU-SYSTEMS

Perfection in Protection, Licensing, and Security

Protect the Code: It’s a National Imperative

MarketingWIBU-SYSTEMS AG el 23 de enero de 2020 15:57 horas

In his syndicated Software Integrity Blog, Jonathan Knudsen of Synopsis, recently made a case for why software should be considered critical infrastructure. He points out that the U.S. recognizes 16 sectors of critical infrastructure that are acknowledged crucial to national economic security and public health. Other countries have similar lists. The most important sector, says Knudsen, is Information Technology, as it is at the intersection of the foundations upon which every other sector is built upon. So why, he asks, “do we see a persistent parade of headlines about data loss, system compromise, and failures?”

Knudson points out that software vulnerabilities are an attractive attack vector for hackers as modern systems are extremely complex and fertile ground for exploitable vulnerabilities; cyber-attacks over the Internet provide a degree of anonymity and safety to the attacker; and cyber operations are cheaper and faster than physical operations. In a nut shell, he notes that for cyber attackers, the required effort is low, risks are minimal, and rewards are high.

The Institute for Critical Infrastructure Technology (ICIT), a Cybersecurity Think Tank, makes a similar case. In a white paper published in April 2019, Software Security is National Security | Why the U.S. Must Replace Irresponsible Practices with a Culture of Institutionalized Security, the ICIT concludes that a lack of software security is a national threat. Today, they say, “software runs the world. PCs, mobile devices, the cloud, the Internet of Things, operational technology, vehicles, appliances, utilities and nearly every modern device runs on code.”

The white paper notes that an estimated 84% of security breaches exploit vulnerabilities in the code at the application layer, making it a most attractive attack point. To understand the magnitude of vulnerabilities that may exist in code, NIST Fellow Dr. Ron Ross, said that “for an application with 50 million lines of code (LOC), assuming the empirically found rate of 4.9 flaws per 1,000 LOC, the application will have between 2,400 to 12,200 potential security vulnerabilities present at release.”

These statistics certainly make a case for secure-by-design development principles to minimize potential vulnerabilities in the code and mechanisms to protect the code that’s already out in the field or about to be launched.

Secure by Design is increasingly becoming the mainstream development approach to ensure security and privacy of software systems. In this concept, security is built into the system from the ground up and addresses the cyber protection considerations throughout a system’s lifecycle. This includes security design for the identification, protection, detection, response and recovery capabilities to strengthen the cyber resiliency of the system.

A number of global industry associations and security vendors, like Wibu-Systems, have proposed security standards and software development frameworks, all based on the core security by design foundation. A good software security reference document was released earlier in the year by BSA | The Software Alliance. The report, The BSA Framework for Secure Software: A New Approach to Securing the Software Lifeycle, provides a common organization and structure to capture multiple approaches to software security by identifying standards, guidelines, and practices that can help software development organizations achieve desired security outcomes while accounting for the wide spectrum of intended uses, risk profiles, and technological solutions among software products.

Examples of real-world use cases for software security solutions can be found in this document, Security 4.0 by Default and Growth 4.0 by Design.

For more information on code protection, take a look at Wibu-Systems CodeMeter Protection Suite, which employs sophisticated encryption mechanisms to protect software from malicious attackers.

Inicie sesión o regístrese ahora y disfrute de todas las ventajas de una comunidad.

Para obtener toda la funcionalidad del Foro de IndustryArena es necesario iniciar sesión o registrarse. Este proceso es absolutamente gratuito.

Password forgotten?
Solicitud de contacto
Guest Photo
Your message
The controller within the meaning of Art. 4(7) GDPR is: IndustryArena GmbH, Schneiderstr. 6, 40764 Langenfeld, Germany.
You may reach our data protection officer under dataprotection@industryarena.com.

Purpose of processing
We process your personal data concerning the use of the contact form and the communication with the company of the newsroom as well as the transmission of your data to this company in accordance to Art. 6 (1a) GDPR. This constitutes a legitimate interest for us in accordance to Art. 6 (1f) GDPR.

Recipient of the data
Within our organization, those units gain access to your data, which are necessary to fulfil the above purposes.
Personal data will only be transmitted to third parties if this is necessary for the aforementioned purposes or if another legal basis exists. If necessary, we conclude the corresponding data protection agreements with third parties, in particular pursuant to Art. 28 GDPR.

Data storing
Your data will be transmitted to the company of the newsroom for further processing. The period of storing is the duration of the processing of your request by the respective company.

Seleccionar persona de contacto

Newsroom Logo

Opciones de diseño

  • Título Color de fuente:
  • Contenido Color de fondo:
  • Contenido Color de fuente:
  • Navegación Fondo:
  • Ficha Color de fuente:
  • Pestaña activa Color de fuente:
  • Enlace Color de fuente:
  • Enlace activo Color de fuente:
  • Imagen de fondo Color de fondo

    ¿Cómo quieres colocar la imagen de fondo?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Establecer el enlace para la imagen de fondo

  • Gráfico de cabecera

    ¿Cómo desea alinear el banner?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Introduzca el destino del enlace para el banner

  • Skyscraper

    Introduzca el destino del enlace para el Skyscraper

Tenga en cuenta:

Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.