One of their first certified architects has subsequently created a few enterprise security reference architectures. The SANS Institute hosted three What Works in Security Architecture Summits. The IEEE initiated a Center for Secure Design. The Center published a Top 10 Design Flaws booklet. Adam Shostack published Threat Modeling: Designing for Security, and renowned threat modeler, John Steven, has told me that hes working on his threat modeling book. Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, Threat Modeler. Choose 2 or 3 three items from the list above and provide an update to their development status. Make sure you provide some background on your selection and then provide the update of the development. You can use my course material textbook if needed:
Title: Securing Systems Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS ISBN: 9781482233971 Authors: Brook S. E. Schoenfield Publisher: CRC Press Publication Date: 2015-05-20
Criteria: 1. No errors in APA style. Scholarly style. Writing is flowing and easy to follow. 2. Strong introduction of the topics key questions), terms. Clearly delineates subtopics to be reviewed. Specific thesis statement. 3. Strong review of key conclusions. Strong integration with thesis statement. An insightful discussion of the impact of the researched material on the topic. 4. All references and citations are correctly written and present 5. All material clearly related to subtopic, main topic. Strong organization and integration of material within subtopics. Strong transitions linking subtopics, and main topic. 6. Strong peer-reviewed research based on support for the thesis. 7. The paper is free of grammatical, spelling, and punctuation errors.
Please try to divide the document with the introduction, body, and conclusion (with headings). Thats helps me with the grading.
The post encouraging security architecture developments appeared first on .