quartz/content/notes/21-SE-in-IA-2.md
2022-10-10 11:12:45 +13:00

1.7 KiB

title aliases tags
21-SE-in-IA-2
comp210
lecture

need in all phases

  • often overlooked in feasability stages
  • security requirements not defined
  • built without thinking about security
  • tests do not take security into account
  • without security evolution can become cumbersome

more costly to fix bug in development than in design

  • the later we fix it the more costly it is

from the start

  • hire right people
  • with hacking mindset
    • so they alwasys think about security
  • invite customers to training and seminars
    • testing could uncover security issues

questions during feasability

  • what are the implications for users if assets are lost
    • some information is more high risk that other information

during design

  • should be designed in iterative manner
  • threat modelling
    • diagram
    • Data Flow Diagram (DFD)
      • high or low level
      • want to be nimble
      • dont want to go overboard
      • level 1 dfd
  • potential threats
  • STRIDE
    • list
    • can identify parts system using DFD that are threatened by these things
      • e.g
      • threat tree
        • defines the potential dcisions that are performed by the attacker
      • information to keep track of
      • risk = criticality * likligood of occurance
        • should be consistent
        • can also use DREAD
          • list

example

responsing to threats

  • do nothing
  • inform user
  • remove problem
  • fix problem