Abstract—In software installation, the hardening status of the target system is difficult to assessed and usually depends on the expertise and care of system administrator. These non-functional requirements can be rendered functional by using misuses in misuse case diagram. This allows the assessment to be incorporated into the software design process and implemented as part of the deployment module. The assessment can thus be carried out automatically during software installation. As system hardening is mostly independent from software functionalities, the assessment can be expressed as design patterns to accommodate the design process. Four examples of system hardening were used: program and data memory separation, Mandatory Access Control (MAC), firewall, and logging.
Index Terms—Misuse, hardening, installation, security pattern.
The authors are with Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand (Corresponding author. Tel.: +66-22186991, fax: +66-22186955, e-mail: firstname.lastname@example.org, 2 email@example.com).
Cite: Kwanchanok Limbandit and Yunyong Teng-Amnuay, "Misuse for Security Hardening Assessment in Application Software Deployment," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 147-150, 2012.