Chapter 9. Identify Targets and Roles

Chapter 9. Identify Targets and Roles

Chance favors the prepared mind.

Louis Pasteur

Now we begin to apply our I-ADD security analysis process, described in Chapter 2, "Security Principles." As you may recall, the I-ADD security analysis process consists of four phases:

         Identify targets and roles.

         Analyze known attacks, vulnerabilities, and theoretical attacks, generating mitigations and protections.

         Define a strategy for security, mindful of security/functionality/management trade-offs.

         Design security in from the start.

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net