Security Engineering II
Learning Objectives
- Recognize design guidelines for secure systems
- Recognize guidelines for dependable programming
- Identify the security requirements for a system
- Analyze requirements for a system and identify appropriate architectural designs
How to Complete this Lesson
Complete the following learning activities: (1.25 hours total)
- Read “The Inside Story Behind MS08-067” (15 minutes)
- Attend the class meeting (60 minutes)
Resources
Videos
-
Introduction to Information Assurance (IA) (15 minutes)
This video states the three phases of risk management are risk assessment, risk treatment, and risk control (Erl et al. 2013). This description differs from Sommerville (2016)’s risk management process (i.e., risk identification, risk analysis, risk planning, and risk monitoring). Though the difference is superficial, any assessment questions will be based on Sommerville’s model.
- What Every Engineer Needs to Know About Security and Where to Learn It – stop at 21:42 (22 minutes)
- Security Testing Fundamentals (93 minutes)