Application security
Infrastructure security
Security dimensions
Three controls to enhance system security
Stages of preliminary risk assessment
Operational security
Security trade off
Protection issues in system design
Distribution issues in system design
Design guidelines for secure systems engineering:
Experience-based testing
Penetration testing
Tool-based testing
Formal verification
Interception threats
Interruption threats
Modification threats
Fabrication threats
Security specification