<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Security-Related Requirements</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Security-Related Requirements</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/security-related-requirements/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 14 Mar 2022 00:00:00 -0400</lastBuildDate><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>Integrating Safety and Security Engineering for Mission-Critical Systems</title><link>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Critical systems must be safe from harm and secure, but safety and security practices have evolved in isolation. The SEI is improving coordination between safety and security engineering.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Procter, Sholom Cohen</dc:creator><pubDate>Mon, 10 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Safety-Related Requirements</category><category>Security-Related Requirements</category></item><item><title>Automating System Security with AADL: 11 Rules for Ensuring a Security Model</title><link>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post presents an approach for modeling and validating confidentiality using AADL, and 11 analysis rules for ensuring security model consistency.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aaron Greenhouse</dc:creator><pubDate>Mon, 26 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 01 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Cyber Risk and Resilience Management</category><category>Static Analysis</category><category>Cybersecurity</category><category>Secure Development</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Using the SEI CERT Coding Standards to Improve Security of the Internet of Things</title><link>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 11 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Secure Development</category><category>Cyber Missions</category><category>Internet of Things</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Decision-Making Factors for Selecting Application Security Testing Tools</title><link>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I presented 10 types of application security testing (AST) tools and discussed when and how to use them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 20 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>Software and Information Assurance</category><category>Testing</category><category>Vulnerability Analysis</category><category>Secure Development</category></item><item><title>IPv6 Adoption: 4 Questions and Answers</title><link>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>IPv6 deployment is on the rise. Google reported that as of July 14 2018, 23.94 percent of users accessed its site via IPv6, up 6.16 percent from that same date in 2017....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 13 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>IPV6</category><category>Secure Development</category></item><item><title>The Need to Specify Requirements for Off-Nominal Behavior</title><link>https://www.sei.cmu.edu/blog/the-need-to-specify-requirements-for-off-nominal-behavior/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore off-nominal behavior in requirements engineering, addressing incomplete specifications and defining system behavior in abnormal situations in this SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Firesmith</dc:creator><pubDate>Mon, 16 Jan 2012 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-need-to-specify-requirements-for-off-nominal-behavior/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Safety-Related Requirements</category><category>Security-Related Requirements</category><category>Acquisition Transformation</category></item><item><title>Obstacles in Engineering Safety- and Security-Related Requirements, Second in a Three-Part Series</title><link>https://www.sei.cmu.edu/blog/obstacles-in-engineering-safety-and-security-related-requirements-second-in-a-three-part-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The 2nd part of this SEI Blog series dives deeper into key obstacles organizations encounter concerning safety and security related requirements.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Firesmith</dc:creator><pubDate>Mon, 18 Jul 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/obstacles-in-engineering-safety-and-security-related-requirements-second-in-a-three-part-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Safety-Related Requirements</category><category>Security-Related Requirements</category><category>Acquisition Transformation</category></item></channel></rss>