Please enable JavaScript.
Coggle requires JavaScript to display documents.
Secure Software Design (Define the Security Architecture (Security…
Secure Software Design
Requirements Allocation
Modeling Security Properties
Design Considerations
Threat Modeling
Types of Malware
Threat Surfaces
Attack surface evaluation
Constrained User interface
Define the Security Architecture
Security Architecture
Meeting Requirements
Architecture Methodologies
SDLC
Enterprise-wide Architecture
Architecture Models
Client Server
The Waterfall
Rich Internet Application
Pervasive Computing
IoT Risk
Feature-based risk
Near Field Communication
Trusted Components
Moving to the cloud
Reasons to migrate to cloud
Cloud-based advantages
Mobile Applications
Performing Secure Interface Design
Performing Secure Interface Design
Interfaces
Out of band
State
Models
Performing Architectural Risk Assessment
Design Secure Assembly Architecture
Perform Secure Assembly Architecture for Component-based Systems
Outside Vendors
Power and Environmental Controls
Secure Design Principles
Evaluate and Select Reusable Secure Design
Operating System Security
Software Defined
Data Loss Prevention
Encryption
Asymmetric Algorithms (Public Key)
Integrity
Databases
Programming Environments
Design Security Review