$1,150
pledged of $60,000pledged of $60,000 goal
3
backers
0seconds to go
Funding Unsuccessful
The project's funding goal was not reached on Tue, December 5 2017 10:05 AM UTC +00:00
AppSec Designer (TM)By AppSec Designer (TM)
First created
AppSec Designer (TM)By AppSec Designer (TM)
First created
$1,150
pledged of $60,000pledged of $60,000 goal
3
backers
0seconds to go
Funding Unsuccessful
The project's funding goal was not reached on Tue, December 5 2017 10:05 AM UTC +00:00

What is a prototype?

A prototype is a preliminary model of something. Projects that offer physical products need to show backers documentation of a working prototype. This gallery features photos, videos, and other visual documentation that will give backers a sense of what’s been accomplished so far and what’s left to do. Though the development process can vary for each project, these are the stages we typically see:

Proof of Concept

Explorations that test ideas and functionality.

Functional Prototype

Demonstrates the functionality of the final product, but looks different.

Appearance Prototype

Looks like the final product, but is not functional.

Design Prototype

Appearance and function match the final product, but is made with different manufacturing methods.

Production Prototype

Appearance, function, and manufacturing methods match the final product.

8116f68e5f8a7882b3ace2ac4074825a original.png?ixlib=rb 1.1

Prototype Gallery

These photos and videos provide a detailed look at this project’s development.

About

AppSec Designer (TM)

Seeking funds to pay someone to code the application. We will set it up on the cloud for trial use, and support individual copies.

Eliminate Security Design Errors in Software that Contribute up to $166 Billion in Losses Each Year

Worldwide losses due to cyber security vulnerabilities are $500 Billion per year. In MITRE’s Common Weakness Enumeration, one-third of software vulnerabilities are described as design errors. These may account for up to $166 Billion in losses per year.

AppSec Designer (TM) Introduces a New Paradigm:

● Common Criteria Security Functional Requirements, including their dependencies, are re-used and grouped into Security Requirements Packages

● Security Components are characterized as consisting of Security Requirements Packages

● Reference Libraries are community-supported, and may be customized locally to meet your needs and standards

● This enables expanding, e.g., a TLS Component into over 25 detailed Application Security Functional Requirements

● AppSec DesignerTM uses Graph Database technology which enables enumerating a large number of Application Security Functional Requirements very fast

● Application Security Functional Requirements can now be enumerated:  

    ○ At the low-level logic-layer of a design

    ○ For a very large number of requirements

    ○ At very fast speeds

    ○ In such detail that Threat Modeling becomes less relevant

● This completely changes how Security Architects, Security Engineers, and Developers can obtain Security Requirements

● Business Nonfunctional Security Requirements typically are not very effective from a security design perspective, and they do not tell the programmers how to incorporate security functions into designs. With AppSec Designer (TM) they can generate useful Application Security Functional Requirements that they can program to

● Better yet, the Application Security Functional Requirements can be provided to QA testers. They will be able to test security design details that were previously omitted

Benefits of AppSec Designer(TM)

● Enables characterizing security variables in a model so they can be controlled

● Expands the security requirements using community-supported Security Functional Requirements libraries, and their dependencies

● By selecting which Application Security Functional Requirements are already implemented in the current design, the missing ones are identified

● Slash your software security liability by up to 1/3rd

● Enables standardizing the Threat Modeling process, selection of countermeasures, and the related security functional requirements – using a community-supported threat modeling and countermeasures library

● Enables flagging requirements that are missing from current design

● Facilitates decision-making using Risk-Benefit Analysis of each missing security functional requirement, generating documentation where risk is accepted

● Supports deferring implementation of missing security functional requirements, and documenting which application release the changes are deferred to

● Facilitates generating reports needed to implement the chosen missing requirements – for design and coding changes, plus unit, integration, and QA testing

● Provides details for system security plans in ISO and NIST formats

Licensing Available (estimated availability 2Q 2018)

● Free online service (limited to a single application model at a time) that makes use of community provided and supported security functional requirements and threat modeling mitigations libraries

● Cloud based Software-as-a-Service license

● Enterprise license

Risks and challenges

There is a minor risk that the estimates for completing the software development are too low. There is also a risk that the outsourced software developer(s) do not deliver as expected. Our CEO has extensive software development experience, so we feel we should be able to manage the project in order to assure success.

There is also a risk that the trial service may become so popular that it becomes a financial burden to maintain. But, if that is the case, we should be able to sell licenses!

Learn about accountability on Kickstarter

Questions about this project? Check out the FAQ

Support

  1. Select this reward

    Pledge $100 or more About $100

    1-Month Cloud License 1-User

    Transferable cloud license for one user for one month and unlimited applications that may be modeled and saved.

    Less
    Estimated delivery
    1 backer
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  2. Select this reward

    Pledge $500 or more About $500

    6-Month Cloud License 1-User

    Transferable cloud license for one user for six months and unlimited applications that may be modeled and saved.

    Less
    Estimated delivery
    0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  3. Select this reward

    Pledge $1,000 or more About $1,000

    1-Year Enterpise License - 1 User

    Transferable One-Year License & Support for Enterprise Edition - One User License

    Less
    Estimated delivery
    1 backer
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  4. Select this reward

    Pledge $5,000 or more About $5,000

    1-Year License with Consulting - 1 User

    Transferable One-Year Enterprise License & Support for one user, plus up to 40 hours of consulting time to assist in customizing reference libraries

    Less
    Estimated delivery
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  5. Select this reward

    Pledge $10,000 About $10,000

    12 User License One Year

    Transferable enterprise or cloud license & support for your team of 12 users for one year.

    Less
    Estimated delivery
    0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.

Funding period

- (60 days)