Archives

Best Software Assurance Practices in Acquisition of Trusted Systems

Best Software Assurance Practices in Acquisition of Trusted Systems
Best Software Assurance Practices in Acquisition of Trusted Systems
File Size:
106.59 kB
Author:
Mary L. Polydys, Daniel J. Ryan, Julie J. C. H. Ryan
Date:
01 July 2006
Downloads:
1487 x

Systems software and application software make it possible for our systems and networks to function effectively and efficiently, enabling creation, processing, storage and communication of the information assets that drive our economy and our way of life. Our dependency on the information infrastructure makes software assurance an essential element of national security and homeland defense. The interdependence of our critical infrastructures with the information infrastructure, the size and complexity of software systems, our increasing reliance on outsourcing for software development and maintenance, and the growing sophistication of malicious threats argue for increased rigor and use of software assurance methodology in developing or acquiring software.

 
 
Powered by Phoca Download