<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Security and Computer Forensics in Web Engineering Education</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>L. Milton Glisson, School of Business and Economics, N.C. A&amp;T State University</institution>
          ,
          <addr-line>1601 East Market Street, Greensboro, NC, 27411</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ray Welland, Department of Computer Science, University of Glasgow</institution>
          ,
          <addr-line>Sir Alwyn Williams Building, Glasgow, G12 8QQ</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>William Bradley Glisson, HATII, University of Glasgow, 11 University Gardens</institution>
          ,
          <addr-line>Glasgow, G12 8QQ</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications.</p>
      </abstract>
      <kwd-group>
        <kwd>Web Engineering</kwd>
        <kwd>Security</kwd>
        <kwd>Computer Forensics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The integration of security and forensics into Web applications is imperative!
Deloitte’s latest survey indicates that organizations are becoming more frugal, more
demanding and more cynical through a reduction in spending and reliance on metrics
when it comes to the implementation of security [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The latest report form
PricewaterhouseCoopers (PwC) echoes this message indicating that “security
spending is under pressure. Most executives are eyeing strategies to cancel, defer or
downsize security-related initiatives”[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The Internet Crime Complaint Center (IC3)
Report indicates that complaints increased by 22.3% in 2009 as compared to 2008.
This translates into a total dollar loss from referred cases to be $559.7 million, more
than doubling the 2008 loss of $246.6 million [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A substantial portion of the
complaints had to do with some form of fraud [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        According to the UK Cards Association “Online banking losses totaled £59.7
million in 2009 – a 14 per cent rise on the 2008 figure.” They go on to indicate that
“This increase is largely due to criminals using more sophisticated methods to target
online banking customers through malware, which targets vulnerabilities in
customers’ PCs, rather than the banks’ own systems…” [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This indicates that
criminals are, possibly, becoming savvier in their attacks and that Web engineering
needs to expand its scope to cover the entire transaction process; not just specific
systems. Web Engineering has been defined as:
“the application of systematic, disciplined and quantifiable approaches
to development, operation, and maintenance of Web-based
applications” [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>It is important to recognize that previous definitions of Web Engineering do not
inherently make any direct references to security or forensics, consequently, today’s
Web applications face increased susceptibility to major security problems. This
information highlights the need for academic institutions to integrate security and
computer forensics’ concepts and practices throughout Web engineering curricula.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Curricula</title>
      <p>
        The idea for the implementation of security into systems has been around for a while
as witnessed by the creation of a number of Information Assurance academic
programs in the United States [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Several of these programs are listed on the National
Security Agency’s (NSA) Web site for Centers of Academic Excellence [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Papers
have been published on the implementation of security curricula [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and the
integration of security ethics [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] into education. They have also been published on
laboratory based solutions that implement information security knowledge [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and
Internet security [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] into education. However, these approaches offer very broad
solutions to the security problem. Universities that are specifically offering curricula
in Web Engineering should address business, security and forensics needs throughout
all aspects of the Web Engineering curriculum.
      </p>
      <p>From a Web Engineering perspective, an understanding of security needs to be
established that includes how security has evolved, the legislation, regulation and
certifications that impact security. It includes the implementation of security from a
methodology perspective and discussions about how security fits into different
application development methodologies. It would also need to address practical lab
based implementation scenarios that reinforces concepts put forth in lectures.</p>
      <p>
        There are a limited number of courses being offered in Web engineering and few
complete programs to-date. On the postgraduate level, the University of Western
Sydney offers a track in a Masters program [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Deshpande, from the University of
Western Sydney, has put forth ideas for a Web Engineering curriculum and has
proposed six levels of complexity that need to be addressed in the curriculum [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
However, it can be argued that there is a seventh level of complexity that needs to be
explicitly addressed and that is Web Engineering Security! Whitehead [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] proposed
a curriculum for a masters program in Web Engineering. However, he does not
discuss, at any point in the paper, security.
      </p>
      <p>
        North Carolina A&amp;T State University has proposed a complete undergraduate
program in Web Engineering [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. However, to-date from their Web site this program
does not appear to be currently available. The paper that they put forth to propose the
program does mention security twice. The first occurrence is in the class description
for the Introduction to Web Engineering where they state that students will learn
“how to incorporate security feature(s) into web sites” [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. They also propose a
specific course on ‘Trust and Security’[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Their proposal focuses more on the social
aspects of the program and the potential benefits for attracting a diverse student body
as well as increasing overall student numbers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. There appears to be a lack of
indepth security integration throughout the program. A quick search on the Web reveals
a Web Engineering ‘suggested’ program of study for a Bachelor of Science in
Applied Information Technology at Kentucky State University [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The program
introduces security in the senior year through a course titled ‘Information Security’
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The lack of information security topics throughout both undergraduate curricula
is worrisome at the very least!
      </p>
      <p>The reality in today’s increasingly competitive academic environment is that
courses need to be utilized as much as possible. Curricula need to be introduced and
implemented so that they take advantage of existing infrastructure. A dedicated lab
for a forensics or security course can also be utilized by the other programs. These
facilities also can be used to implement specific courses in related areas like Web
Engineering undergraduate and postgraduate degrees. The topics complement each
other very nicely. Course work can be constructed so that students learn how to create
viruses, trojans, and worms for the security related courses. The same students can
then learn how to develop and integrate code into Web engineering projects that will
identify these threats and log actions appropriately for the forensics course.</p>
      <p>The trick is to make the learning environment fun for the students and beneficial
for employment opportunities once the course is complete. This has to be balanced
with University requirements. These requirements would include appropriate security
measures to ensure that code developed in the security lab is not allowed to be
introduced to the outside world. This could include measures like dedicated labs,
swipe card entry, video surveillance, and policies that restricting devices that are
brought into the lab. Additional measures would include the removal of USB ports
and outwardly facing drives. To help mitigate worst case scenarios, additional
software measures could also be introduced that limits the life span of any code
developed in the lab.</p>
      <p>
        Regardless of how security is implemented in a specific program, the initial
problem with tackling security is the terminology. Terminology in various
environments has the potential to have multiple meanings. As Anderson indicated,
reality is a complex environment in the real world [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Hence, what the terms
security and vulnerability mean to one organization, such as a large financial
institution, may or may not have the same relevance to another business, such as a
newsagent or a small legal firm. Logically, different organizations will require “some
combination of user authentication, transaction integrity and accountability,
faulttolerance, message secrecy and covertness” [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. So what is the definition of security?
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Security Definition</title>
      <p>
        In this paper, we will define a Web enabled secure system in terms of well established
security concepts which consist of confidentiality, integrity and availability [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ].
The Web Engineering solution should protect confidentiality by limiting access to the
appropriate individuals [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. This would involve user identification, authentication
and authorization. The integrity of the system should be maintained by only allowing
modifications to be conducted by the appropriate individuals and within established
guidelines [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. The availability of the system is defined by providing access to the
appropriate parties at designated times [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. It should be noted that there are two
additional categories that are commonly included when discussing security and they
are ‘non-repudiation’ and ‘accountability’. Non-repudiation is the capability to
prevent, in this case, a software user, a system, or an application from denying actions
they have performed. Accountability is the recording of the software user’s actions.
Since “accountability includes authenticity and non-repudiation” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and authenticity
is the “property that allows the ability to validate the claimed identity of a system
entity” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], i.e., the authentication aspect, we will consider these topics to be
subtopics of confidentiality that are utilized to help ensure integrity.
      </p>
      <p>
        Vulnerabilities will be defined using The Organization for Internet Safety (OIS)
definition. It has been said that “security is about preventing adverse consequences
from the intentional and unwarranted actions of others” [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. OIS publishes
Guidelines for Security Vulnerabilities Reporting and Response. In this document,
security vulnerability is defined as
“a flaw within a software system that can cause it to work contrary to
its documented design and could be exploited to cause the system to
violate its documented security policy” [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        It should be noted that this statement makes the assumption that a documented
security policy exists. The reality of the OIS vulnerability definition is that any flaws
in the system design or application coding can potentially lead to security
vulnerabilities. The need to improve security in the Web application development is
reinforced by testimony from Robert F. Decay, Director, Information Security Issues
indicating that patch management is critical in mitigating cyber vulnerabilities [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
According to the same report, the number of security vulnerabilities reported is
increasing and attacks are becoming automated [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Software security encompasses
more than encryption and password maintenance. The ability to defend against
software attacks, in the long run, will need to come from “more rigorous software
engineering practices, better tools and technologies” [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        Using these broad definitions to understand security supports the idea that security
means more than implementing encryption, Secure Socket Layer (SSL), firewalls and
creating and maintaining secure networks [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ]. It is also more than the use of
digital certificates, the different technologies used for authentication and authorization
or intrusion detection systems [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ]. In-depth discussions on these topics and
research into their improvement are occurring on a daily basis. However, a system’s
security is not determined solely by the technology that is implemented. Web security
is determined by a number of factors that include legal issues, social issues, technical
issues, and Web engineering practices. This expansive perspective on the scope of
security was reinforced by Eugene Spafford, a security expert and professor at Purdue
University when he stated in an interview that “security is a total-picture issue, not a
set of spot problems to patch” [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Security Literature</title>
      <p>
        In order to incorporate security into a Web Engineering curriculum, it is necessary to
appreciate the current state of security methodology research and to acknowledge
previous research in the field of information security design methods [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
Baskerville’s analysis separated numerous system methods into three generations
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The first generation consisted of check lists and risk analyses. This stage focused
on actual physical systems specifications. The second generation engineering methods
focused on complex customization through the use of engineering concepts and
mechanistic procedures that relied heavily on functional requirements.
      </p>
      <p>
        Even though Baskerville’s analysis of the security design methods did not directly
examine the applicability of the security methodologies to Web development, he did
make an important point that is applicable to Web Engineering application
development. Baskerville’s analysis did suggest that
“systems methods will neither be trustworthy nor successful unless the
general research regarding systems methodology incorporates security
analysis design as an explicit objective” [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        Siponen updates and expands on Baskerville’s analysis of information security
development approaches declaring that there are five information system security
generational classifications [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Siponen arrives at his conclusion after an
examination of the contributing research disciplines and an evaluation of seventeen
modern information system security methodologies. Security is a highly diverse
research subject that has been an area of interest for a variety of disciplines. Siponen
identifies four research communities as contributors to information security research
including Management Information Systems (MIS), computer science, software
engineering and mathematics.
      </p>
      <p>
        Siponen’s first three generations correspond with Baskerville’s generational
classifications. Siponen defined the third generation as consisting of structural and
object-oriented security methods, information modelling methods, and stepwise
security methods. According to Siponen, the fourth generation builds on the third
generation by addressing the social and socio-technical aspects of the methods. The
fifth generation, of security methodologies, that Siponen discusses [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is really the
next generation of methodologies. This implies that the fifth generation security
methodologies do not currently exist, a point which he also articulates in a later article
[
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. Siponen’s points, regarding the fifth generation, bring us to the heart of the
security problem. There have been few industrial attempts to comprehensively
address user focused aspects; methodology integration; practitioner malleability and
employment of Web engineering security throughout the Web-based application
development process via the establishment of a comprehensive security methodology.
One industrial solution is the Web Engineering Security methodology (WES). WES is
a proactive, flexible, customizable, process neutral security methodology that is based
on empirical evidence [
        <xref ref-type="bibr" rid="ref17 ref29 ref30">17, 29, 30</xref>
        ]. The natural question that arises when you are
discussing security is what happens when it fails?
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Web Forensics Information</title>
      <p>Security and forensics are two sides of the same coin. Security tries to prevent
undesired things from happening while forensics acknowledges that something has
happened and attempts to prove it through the evidence that is left on machines,
networked devices and/or mobile devices.</p>
      <p>
        Appreciating that security is a broad concept that needs to be covered in its entirety
ushers in the concept of educating people to prepare and handle situations when
things go wrong. In order to accomplish this integration, forensics needs to be
proactively integrated into software development methodologies. Depending on the
needs of the individual organizations, this can include the capturing of necessary log
information, network packets and mobile device information. It can also include the
proper training for personnel on how to handle first responder incidents [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. It is
realistic to perceive a situation where a graduate from a Web Engineering program is
a first responder to a potential criminal situation. How do they handle the situation?
What can they do or not do that will preserve the evidence? This necessitates a basic
understanding of computer forensics principles, techniques, and processes.
      </p>
      <p>In a Web based environment, students should be taught about different operating
and file systems and how they store potentially relevant data from the client and the
server side. As an example, a Windows registry can store information pertaining to
previously visited Web sites, to search queries, and passwords. They should also be
informed about the types of information that can potentially be located on networks
and networked machines. What are the ethical issues that students need to consider?</p>
      <p>
        To complicate matters, Cisco’s latest prediction is that global IP traffic will get to
667 Exabyte’s by 2013 [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. Out of all of the data that is being passed around the
Internet, what information do you need to keep and for how long? What are the legal
implications with maintaining this information? Hence, students need to understand
the relevance of this information in a court of law and the legislative issues that
complicate jurisdictional rights in a global environment. Relevant legislation has been
discussed by Glisson et al. [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. How does this and other legislation impact the design
and implementation of Web engineering systems or the extraction of data in an
investigative situation?
      </p>
      <p>The need for security and forensic integration into Web Engineering is highlighted
with the emergence and high rate of acceptance currently demonstrated with cloud
computing. Hence, a Web Engineering curriculum needs an in-depth exposure to
operating and file systems, networks, dynamic memory, legal and ethical
implications, mobile devices and basic digital forensics concepts and procedures.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Security and Forensics Curriculum Integration</title>
      <p>
        The integration of these concepts into a Web Engineering curriculum is challenging.
There are so many aspects of both security and digital forensics that need to be
discussed through out the implementation of the program that it makes covering all of
them to any depth difficult. This issue is highlighted in Table 1- Curriculum
Integration. The courses and the year were taken as an example from the Bachelor of
Science in Applied Information Technology at Kentucky State University [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The
corresponding security and forensic topics are offered as a guide in corresponding
classes and are not meant to be a definitive solution.
With the blatant need for improved security, coupled with the increasing
implementation of security metrics in industry, the need to address security and
forensics throughout Web Engineering curricula is critical. This includes addressing
everything from an in-depth understanding of the concept of security, to hardware
implications, to secure application development and to the legal, as well as, ethical
implications associated with Web Engineering.
      </p>
      <p>
        As the US Department of Homeland Security has stated “there is nothing
inherently ‘security-enhancing’ about most development methodologies”[
        <xref ref-type="bibr" rid="ref34">34</xref>
        ].
Developing applications and understanding the interactions from a security and a
forensics perspective is critical from a Web Engineering curriculum perspective.
These concepts should be integrated throughout a Web Engineering curriculum.
      </p>
      <p>As the digital revolution continues to saturate societies and these devices
continually become more networked, the need to address security and forensics in
Web engineering curricula will continue to be a critical issue. Future work should
explore the impact of cloud computing on practical real-world implementations of
security and forensics in the realm of Web Engineering. It should focus on the
integration of security and forensics concepts throughout the academic curriculum;
not via a single class or set of lectures.
8</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Losing Ground 2009 TMT Global Security Survey Key findings</article-title>
          . https://www.deloitte.com/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. PricewaterhouseCoopers, Trial by fire.
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Internet</given-names>
            <surname>Crime Complaint Center</surname>
          </string-name>
          ,
          <source>2009 Internet Crime Report</source>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>4. The UK Cards Association. http://www.theukcardsassociation.org.uk/media_centre/press_releases_new/-/page/922/.</mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Deshpande</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , et al.,
          <source>Web Engineering. Journal of Web Engineering</source>
          ,
          <year>2002</year>
          . vol.
          <source>(No. 1)</source>
          : p.
          <fpage>3</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Deshpande</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Web Engineering</surname>
          </string-name>
          <article-title>Curriculum: A Case Study of an Evolving Framework</article-title>
          . in Web Enginering 4th international conference, ICE
          <year>2004</year>
          .
          <year>2004</year>
          . Munich, Germany.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>National</given-names>
            <surname>Security</surname>
          </string-name>
          <article-title>Agency</article-title>
          . http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Crowley</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <article-title>Information system security curricula development</article-title>
          ,
          <source>in Proceedings of the 4th conference on Information technology curriculum</source>
          .
          <year>2003</year>
          , ACM: Lafayette, Indiana, USA.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dark</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.,
          <article-title>An information security ethics education model</article-title>
          .
          <source>J. Comput. Small Coll</source>
          .,
          <year>2008</year>
          . vol.
          <volume>(6</volume>
          ): p.
          <fpage>82</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Elitzur</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sai</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A Laboratory</given-names>
            <surname>Study</surname>
          </string-name>
          <article-title>Designed for Reducing the Gap between Information Security Knowledge and Implementation</article-title>
          .
          <source>International Journal of Electronic Commerce Studies</source>
          ,
          <year>2010</year>
          . vol.
          <volume>(1</volume>
          ): p.
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Mateti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>A laboratory-based course on internet security</article-title>
          ,
          <source>in Proceedings of the 34th SIGCSE technical symposium on Computer science education</source>
          .
          <year>2003</year>
          , ACM: Reno, Navada, USA.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Esterline</surname>
            ,
            <given-names>A. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>K. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carr</surname>
          </string-name>
          , E. C. http://redux.comp.ncat.edu/carr/web_engineering/SIGCSE_Web.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Whitehead</surname>
            ,
            <given-names>E. J.,</given-names>
          </string-name>
          <article-title>A PROPOSED CURRICULUM FOR A MASTERS IN WEB ENGINEERING</article-title>
          .
          <source>Journal of Web Engineering</source>
          ,
          <year>2002</year>
          . vol.
          <volume>(1</volume>
          ): p.
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>14. Kentucky State University. http://www.kysu.edu/.</mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Security Engineering: A Guide to Building
          <source>Dependable Distributed Systems</source>
          .
          <year>2001</year>
          , New York: John Wiley &amp; Sons, Inc.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hansche</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berti</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hare</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Official</surname>
          </string-name>
          (ISC)
          <article-title>2 Guide to the CISSP Exam</article-title>
          .
          <year>2004</year>
          , Boca Raton: Auerbach.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Glisson</surname>
            ,
            <given-names>W. B.</given-names>
          </string-name>
          ,
          <article-title>The Web Engineering Security (WES) Methodology</article-title>
          , in Department of Computing Science.
          <year>2008</year>
          , University of Glasgow: Glasgow. p.
          <fpage>245</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Pfleeger</surname>
            ,
            <given-names>C. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pfleeger</surname>
            ,
            <given-names>S. L.</given-names>
          </string-name>
          , Security in Computing. Third Edition ed.
          <year>2003</year>
          , Upper Saddle River, NJ: Prentice Hall.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Krutz</surname>
            ,
            <given-names>R. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vines</surname>
            ,
            <given-names>R. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>The</surname>
            <given-names>CISSP</given-names>
          </string-name>
          <source>and CAP Prep Guide</source>
          .
          <year>2007</year>
          , Indianapolis, IN: Wiley.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Schneier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <source>Beyond Fear: Thinking Sensibly About Security in an Uncertain World</source>
          .
          <year>2006</year>
          , New York: Springer-Verlag New York Inc.
          <volume>303</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <article-title>Organization for Internet Safety</article-title>
          . http://www.symantec.com/index.jsp.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Dacey</surname>
            ,
            <given-names>R. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>INFORMATION SECURITY</surname>
          </string-name>
          <article-title>Effective Patch Management is Critical to Mitigating Software Vulnerabilities, in Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census</article-title>
          ,
          <source>House Committee on Government Reform</source>
          .
          <year>2003</year>
          , United States General Accounting Office.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Dickson</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <article-title>Web applications have become IT's next security battleground</article-title>
          . San Antonio Business Journal,
          <year>2004</year>
          . vol.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Ellis</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Speed</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <article-title>The internet security guidebook: from planning to deployment</article-title>
          , ed. E. Carrasco.
          <year>2001</year>
          , San Diego: Academic Press.
          <fpage>1</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>McCormick</surname>
          </string-name>
          , J. http://www.baselinemag.
          <source>com/article2/0</source>
          ,1397,
          <issue>2152093</issue>
          ,00.asp.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Baskerville</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <article-title>Information systems security design methods: implications for information systems development</article-title>
          .
          <source>ACM Computing Surveys</source>
          ,
          <year>1993</year>
          . vol.
          <volume>(4</volume>
          ): p.
          <fpage>375</fpage>
          -
          <lpage>414</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <article-title>Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods</article-title>
          .
          <year>2004</year>
          , Department of Information Processing Science, University of Oulu: Oulu, Finland. p.
          <fpage>37</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <article-title>Secure-System Design Methods: Evolution and Future Directions</article-title>
          .
          <source>IT Professional</source>
          ,
          <year>2006</year>
          . vol.
          <volume>(3</volume>
          ): p.
          <fpage>40</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Glisson</surname>
            ,
            <given-names>W. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Welland</surname>
          </string-name>
          , R. Web Engineering Security:
          <article-title>Essential Elements</article-title>
          . in The Second International Conference on Availability, Reliability and Security (ARES)
          <year>2007</year>
          . Vienna, Austria: IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Glisson</surname>
            ,
            <given-names>W. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDonald</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Welland</surname>
          </string-name>
          , R. Web Engineering Security:
          <article-title>A Practitioner's Perspective</article-title>
          . in International Conference on Web Engineering.
          <year>2006</year>
          . Palo Alto, California: Springer.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Hoolachan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glisson</surname>
          </string-name>
          , W. B.
          <article-title>Organizational Handling of Digital Evidence</article-title>
          . in
          <source>The 2010 ADFSL Conference on Digital Forensics, Security and Law</source>
          .
          <year>2010</year>
          . St. Paul, Minnesota, USA: Association of Digital Forensics, Security and Law.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Cisco</surname>
          </string-name>
          . http://newsroom.cisco.com/dlls/2009/prod_060909.html.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Glisson</surname>
            ,
            <given-names>W. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glisson</surname>
            ,
            <given-names>L. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Welland</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Secure Web Application Development and Global Regulation</article-title>
          . in The Second International Conference on Availability, Reliability and Security (ARES)
          <year>2007</year>
          . Vienna, Austria: IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34. Department of Homeland Security,
          <source>Security in the Software Lifecycle</source>
          .
          <year>2006</year>
          , Department of Homeland Security: Washington, DC.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>