Security Design Refinement Through Mapping Tactics to Patterns

Review the recording. Security Design Refinement Through Mapping Tactics to Patterns E>. and complete the assigned paper following. Complete the following tasks. using real-world examples. Part I: Provide an example of each of the following tactics:
• Detect attacks
o Detect intrusion
o Detect service denial
o Detect message delay
o Verify Message Integrity
Part II: Provide an example of each of the following:
• Resist attacks
o Identify, authenticate, and authorize actors
o Limit access o Limit exposure
Part III: Provide an example of each of the following:
• Resist attacks:
o Encrypt data
o Validate input
o Separate entities
o Change default settings
Part IV: Provide an example of each of the following:
• React to attacks:
o Revoke access
o Lock access
o Inform actors
• Recover from attacks:
o Maintain audit trail

 

Our customer support team is here to answer your questions. Ask us anything!