Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Software engineering (9/e): Chapter 14 - Sommerville

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Chapter 14 – Security engineering. The objective of this chapter is to introduce issues that should be considered when you are designing secure application systems. When you have read this chapter, you will: understand the difference between application security and infrastructure security; know how life-cycle risk assessment and operational risk assessment are used to understand security issues that affect a system design; be aware of software architectures and design guidelines for secure systems development. | Chapter 14 – Security Engineering Lecture 1 Chapter 14 Security Engineering 1 Topics covered Security engineering and security management Security engineering concerned with applications; security management with infrastructure. Security risk assessment Designing a system based on the assessment of security risks. Design for security How system architectures have to be designed for security. Chapter 14 Security Engineering 2 Security engineering Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Assumes background knowledge of dependability and security concepts (Chapter 10) and security requirements specification (Chapter 12) Chapter 14 Security Engineering 3 Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. . | Chapter 14 – Security Engineering Lecture 1 Chapter 14 Security Engineering 1 Topics covered Security engineering and security management Security engineering concerned with applications; security management with infrastructure. Security risk assessment Designing a system based on the assessment of security risks. Design for security How system architectures have to be designed for security. Chapter 14 Security Engineering 2 Security engineering Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Assumes background knowledge of dependability and security concepts (Chapter 10) and security requirements specification (Chapter 12) Chapter 14 Security Engineering 3 Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks. The focus of this chapter is application security. Chapter 14 Security Engineering 4 System layers where security may be compromised Chapter 14 Security Engineering 5 System security management User and permission management Adding and removing users from the system and setting up appropriate permissions for users Software deployment and maintenance Installing application software and middleware and configuring these systems so that vulnerabilities are avoided. Attack monitoring, detection and recovery Monitoring the system for unauthorized access, design strategies for resisting attacks and develop backup and recovery strategies. Chapter 14 Security Engineering 6 Security risk management Risk management is concerned with assessing the possible losses that might ensue from attacks on the system and balancing these losses against the costs of security procedures that may reduce

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.