Keeping Ahead of Our Adversaries
IEEE Software, Volume 33, Issue 3, 2016, Pages 24-28.
Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podca...More
Full Text (Upload PDF)
PPT (Upload PPT)