Universities fail to produce secure programmers

Powered by SC Magazine
 

Further pressure has been put on educational institutions to improve their security training. In the wake of SANS calls to ‘shame the computer science departments’ Simon Perry, vice president of security strategy at Computer Associates raised the issue again at the SC Conference in London, UK.

Talking about a leading European IT university's programming course, Perry claimed: "There was not a single lecture on secure coding. That's a pretty sad indictment of where the security industry stands today".

Despite angry denials that universities are under performing, most notably from Cambridge's Ross Anderson, the suggestion is that learning functional rather than secure code is an endemic problem. "I certainly think so," said Perry. "It's going to be a problem for a few years yet. Most of these courses are three or four years long, and it takes roughly two years to implement something new. So we're not going to see the results for a long time."

A lack of standards, or accountability, was pointed to as the source of the problem. "If you're teaching cookery you are required to spend time teaching health and safety. This sort of requirement does not exist for our industry," Perry said.

Rather than blaming vendors Perry told companies to look inwards. "Departments don't communicate and parallel projects occur. So we don't get the benefit of existing technology," he said.

www.scmagazine.com/events
www.ca.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 756

Vote