Risk AnalysisQuantitative Risk AnalysisQualitative Risk AnalysisRisk TheoryAttack VectorsMethods of “Vector” AttackAttack by E-MailAttack by DeceptionHoaxesHackersWeb Page AttackAttack of the WormsMalicious MacrosInstant Messaging, IRC, and P2P File-Sharing NetworksVirusesAsset and Data ValuationContext and Data ValueCorporate versus Departmental: ValuationBusiness, Legal, and Regulatory RequirementsProduct Assurance Evaluation CriteriaCommon Criteria (CC) Part 1Common Criteria (CC) Part 2The Target of Evaluation (TOE)Evaluation Assurance Level (EAL) OverviewEvaluation Assurance Level 1 (EAL1) - Functionally TestedEvaluation Assurance Level 2 (EAL2) - Structurally TestedEvaluation Assurance Level 3 (EAL3) - Methodically Tested and CheckedEvaluation Assurance Level 4 (EAL4) - Methodically Designed, Tested, and ReviewedEvaluation Assurance Level 5 (EAL5) - Semiformally Designed and TestedEvaluation Assurance Level 6 (EAL6) - Semiformally Verified Design and TestedEvaluation Assurance Level 7 (EAL7) - Formally Verified Design and TestedCommon Criteria (CC) Part 3: Assurance ParadigmSignificance of VulnerabilitiesThe Causes of VulnerabilitiesCommon Criteria AssuranceAssurance through EvaluationThe Common Criteria Evaluation Assurance ScaleISO/IEC 27000 SeriesSoftware Engineering Institute - Capability Maturity Model (CMMI-DEV) Key Practices Version 1.3Introducing the Capability Maturity ModelSources of the Capability Maturity Model (CMM)Structure of the CMMI-DEV V1.3Intergroup CoordinationPeer ReviewsISO 7498Concepts of a Layered ArchitecturePayment Card Industry Data Security Standard (PCI-DSS)Architectural SolutionsArchitecture FrameworksDepartment of Defense Architecture Framework (DoDAF)The Zachman FrameworkDesign ProcessSystem Security Engineering MethodologiesDesign ValidationCertificationPeer ReviewsDocumentation