Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Software engineering (7/e): Chapter 30 – Ian Sommerville

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

In this chapter, the learning objectives are: To introduce issues that must be considered in the specification and design of secure software; to discuss security risk management and the derivation of security requirements from a risk analysis; to describe good design practice for secure systems development; to explain the notion of system survivability and to introduce a method of survivability analysis. | Security Engineering Objectives To introduce issues that must be considered in the specification and design of secure software To discuss security risk management and the derivation of security requirements from a risk analysis To describe good design practice for secure systems development. To explain the notion of system survivability and to introduce a method of survivability analysis. Topics covered Security concepts Security risk management Design for security System survivability Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Security engineering System layers Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. Infrastructure security is a systems management problem where the infrastructure is configured . | Security Engineering Objectives To introduce issues that must be considered in the specification and design of secure software To discuss security risk management and the derivation of security requirements from a risk analysis To describe good design practice for secure systems development. To explain the notion of system survivability and to introduce a method of survivability analysis. Topics covered Security concepts Security risk management Design for security System survivability Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. A sub-field of the broader field of computer security. Security engineering System layers Application/infrastructure security Application security is a software engineering problem where the system is designed to resist attacks. Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks. The focus of this chapter is application security. Security concepts Examples of security concepts Security threats Threats to the confidentiality of a system or its data Threats to the integrity of a system or its data Threats to the availability of a system or its data Security controls Controls that are intended to ensure that attacks are unsuccessful. This is analagous to fault avoidance. Controls that are intended to detect and repel attacks. This is analagous to fault detection and tolerance. Controls that are intended to support recovery from problems. This is analagous to fault recovery. Security risk management Risk management is concerned with assessing the possible losses that might ensue from attacks on the system and balancing these losses against the costs of security procedures that may reduce these losses. Risk management should be driven by an organisational security policy. Risk management involves Preliminary risk assessment Life cycle risk .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.