search menu icon-carat-right cmu-wordmark

Archive: August 2019

Cybersecurity Engineering for Legacy Systems: 6 Recommendations

Cybersecurity Engineering for Legacy Systems: 6 Recommendations

• SEI Blog
Susan Crozier Cox

Harry Levinson co-authored this blog post. Legacy systems continue to play a key role across many organizations. Engineering cybersecurity into these legacy systems presents some unique challenges. In many cases, the original design team is no longer available, leaving the current team with the challenge of changing poorly- and/or un-documented designs and software. Over the years, these systems can become so outdated that they are unable to keep up with new software patterns and development...

Read More
Mission Thread Analysis Using End-to-End Data Flows - Part 2

Mission Thread Analysis Using End-to-End Data Flows - Part 2

• SEI Blog
Donald Firesmith

The first blog post in this series provided an overview of the E2E Mission Thread Data Flow Analysis (EMDA) method, an approach that analyzes the flow of data as they traverse end-to-end mission threads through the architecture components of a system of systems. That post addressed relevant challenges that EMDA helps system and software architects face and outlined the work products produced by the method. This second blog post discusses the process used to create...

Read More
Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities

Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities

• SEI Blog
Sarah Sheard

Suzanne Miller, Bill Nichols, Don Firesmith, and Mike Phillips contributed to this post. Today's major defense systems rely heavily on software-enabled capabilities. However, many defense programs acquiring new systems first determine the physical items to develop, assuming the contractors for those items will provide all needed software for the capability. But software by its nature spans physical items: it provides the inter-system communications that have a direct influence on most capabilities, and thus must be...

Read More
Mission Thread Analysis Using End-to-End Data Flows  - Part 1

Mission Thread Analysis Using End-to-End Data Flows - Part 1

• SEI Blog
Donald Firesmith

Although the vast majority of military missions require the successful collaboration of multiple cyber-physical systems within an overall system of systems (SoS), almost all system and software architects work on programs developing or sustaining individual systems and subsystems. Often, they do not sufficiently understand the ramifications of how their system interoperates with these other systems to accomplish the overall mission. The lack of an end-to-end (E2E) mission thread analysis leads to numerous difficulties, such as...

Read More