CSSLP Tutorial: Module 04,Part 02 – Architecture Of CPU
For this article, we are going to delve into architecture of CPU (Central Processing Unit) of a computer only at its surface. This is not a language article or a type of article where we’d […]
For this article, we are going to delve into architecture of CPU (Central Processing Unit) of a computer only at its surface. This is not a language article or a type of article where we’d […]
Introduction to secure coding In previous sections, we’ve talked about requirements, design, and now we’re ready to talk about the processes associated involved with coding as well as its vulnerabilities. So, this is the chapter […]
This lesson is over secure software design. We are going to discover the different secure technologies that are available and then also the elements which can be compromised in that software. There is first the […]
In this section, we are going to discuss security and common network architectures that are currently being used. Major concepts will include: centralized versus distributed computing, some ideas behind service oriented architecture, rich internet application, […]
There are four main different types of methodologies which we use for our design process. The first is waterfall which is a very traditional model where there are lots of phases and steps to it. […]
This particular section discusses having a design, the risks associated with the design process and aspects to consider for design from previous sections. Risks associated with designing software or systems involve code reuse and the […]
This section is about threat modeling. There are a number of factors to consider when discussing threat modelling. For example, look to your objectives. First is the security objectives and then also there are other […]
This section is about making your design process a secure process. With the design of the application, there’s several things to consider such as reducing the attack surface. That basically means that you only have […]
In the last section, we talked about some of the different requirements and the fact of needing to get good ones from our clients. However, in this section, we will be dealing more with some […]
In the previous section, we just talked about security requirements. In this section, we will be discussing more of just general requirements. There is a short segment over operational requirements as well. Three of the […]
Copyright © 2020 Gotowebsecurity