Learning Objectives

  • Define the security attributes of confidentiality, integrity, and availability
  • Match the following terms with their definitions
    • asset
    • attack
    • control
    • exposure
    • threat
    • vulnerability
  • Identify security requirements for a system
  • Perform a security risk assessment for a system

How to Complete this Lesson

Complete the following learning activities: (2.75–3.25 hours total)

  1. Watch Maroochy water breach (8 minutes)
  2. Read the following in Software Engineering:
    • Chapter 13: Security engineering (105–135 minutes)
      • Security and dependability
      • Security and organizations (skim)
      • Security requirements (skim)
      • Secure systems design
      • Security testing and assurance
  3. Watch System security (7 minutes)
  4. Watch Security is a sociotechnical issue (12 minutes)
  5. Complete the handout (15 minutes)
  6. Participate in the synchronous session during the class meeting time (optional)
  7. Complete the quiz (5–8 minutes)
  8. Complete the specification (30 minutes)
    • Revise sections for consistent grammar, style, etc.

Due

As a reminder, the following are due this lesson: