Title :
How to tackle security issues in large existing/legacy systems while maintaining development priorities
Author :
Campara, Djenana ; Mansourov, Nikolai
Author_Institution :
CEO, KDM Analytics, Ottawa, ON
Abstract :
Legacy software systems represent a large base of software assets that hold significant corporate intellectual properties, along with carrying large opportunity costs and operational risks. There is a growing need to prolong their lifespan through maintenance efforts and enhance them to accommodate new and changing market requirements and governmental regulations. The majority of these systems were developed at a time when security requirements were more relaxed and not well understood, and at a time when being netted did not have the same consequences as exist today. There is a real need for retrofitting security into legacy software systems so they can operate in the current environments. However, over time, as legacy systems became larger and more complex, their design structure eroded which hinders system comprehension, compromises architectural integrity and decreases maintenance productivity. This makes the task of retrofitting security difficult and risky. Since legacy systems are a large part of our nations´ critical infrastructure we must retrofit-in security in such way that the level of confidence related to security is substantially increased. This paper will discuss a standards based approach to achieving this goal.
Keywords :
industrial property; risk management; software development management; software maintenance; corporate intellectual properties; legacy software systems; operational risks; retrofitting security; software assets; Computer architecture; Costs; Information security; Intellectual property; Risk analysis; Risk management; Software maintenance; Software standards; Software systems; Software tools;
Conference_Titel :
Technologies for Homeland Security, 2008 IEEE Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4244-1977-7
Electronic_ISBN :
978-1-4244-1978-4
DOI :
10.1109/THS.2008.4534443