Deck 27: Security Engineering
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/4
العب
ملء الشاشة (f)
Deck 27: Security Engineering
1
What is an incidence response plan?
An incidence response plan spells out the actions to be carried out by each of the system's stakeholders in response to specific security threats.
Final Exam Question
Final Exam Question
2
Which questions need to be answered in user-centered requirements elicitation?
-What are the users' security software needs?
-How can a secure architecture be designed so it accommodates good user interface design?
-How can satisfying user experience be designed so that it is secure?
-How can a secure architecture be designed so it accommodates good user interface design?
-How can satisfying user experience be designed so that it is secure?
3
Describe steps needs to create a threat model.
-Identify assets
-Create architectural overview
-Decompose application
-Identify threats
-Document threats
-Rate threats
-Create architectural overview
-Decompose application
-Identify threats
-Document threats
-Rate threats
4
What are the elements of a security case?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 4 في هذه المجموعة.
فتح الحزمة
k this deck

