- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 132字
- 2021-06-10 18:42:33
Design
Design progresses once all requirements have been documented. Requirements drive specific design decisions.
Systems are typically decomposed into manageable units—for example, Computer Software Configuration Items (CSCIs). CSCIs allocate functional and security requirements to hardware and software design components.
The design process results in a documented set of architectural descriptions such as the Software Design Document (SDD), the Hardware Design Document (HDD), and the System Design Document (SDD). When each of the applicable documents is finalized and the gate has been passed, the team(s) is/are ready to implement.
This phase is a good time for the security team to work on maturing the security test plan and procedures, which will be used to ensure that the system operates securely—likely during a dedicated test event.
- CTF實戰:技術、解題與進階
- 數據恢復方法及案例分析
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Wireshark 2 Quick Start Guide
- 暗戰亮劍:黑客滲透與防御全程實錄
- 工業物聯網安全
- 反黑命令與攻防從新手到高手(微課超值版)
- 網絡安全技術及應用(第3版)
- Spring Security(Third Edition)
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 軟件安全保障體系架構
- 安全防御入門手冊
- End to End GUI Development with Qt5
- 信息技術基礎:提高篇·實驗與習題
- Cybersecurity Threats,Malware Trends,and Strategies