Writing Secure Programs, An Interview with Steve Lipner, by Peter J. Denning
Abstract
Editor's Introduction: Protecting computing systems and networks from attackers and data theft is an enormously complicated problem. The individual operating systems are complex (typically more than 40 million lines of code), they are connected to an enormous Internet (on order of 1 billion hosts), and the whole network is heavily populated (more than 2.3 billion users). Hunting down and patching vulnerabilities is a losing game. Steve Lipner, partner director of program management in Trustworthy Computing Security at Microsoft, has been involved in securing systems for nearly 40 years and has learned how to make security better. His responsibilities encompass Microsoft’s process for assuring the security of its products and online services— the Security Development Lifecycle (SDL)—as well as a variety of programs related to government evaluations of the security and integrity of Microsoft products and services. Lipner has been a consultant, researcher, development manager, and corporate executive in what we refer to today as “cyber security.” Here he shares his experiences in what has and has not worked. He sees by far the best results when programmers adopt secure development practices. (Peter J. Denning Editor-in-Chief)
Description
The article of record as published may be found at http://dx.doi.org/10.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-04);April 2006. Welcome to the third edition of Homeland Security Affairs. Our Spring 2006 issue features articles about intelligence and homeland security, the demarcations between homeland defense and security, and ideas ... -
Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2012);IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Technology for Homeland Security: Best Papers. As the field of homeland defense and security expands and matures, the contributions from various disciplines become ... -
Homeland Security Affairs Journal, Volume II - 2006: Issue 3, October
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-10);October 2006. Welcome to Volume 2, Issue Three of Homeland Security Affairs. This issue is dedicated to the memory of Lacy Suiter. I believe Lacy would be embarrassed by the idea of dedicating an issue of anything to him. ...