June 2020
Intermediate to advanced
382 pages
11h 39m
English
It is important to first understand the exact security needs of a system. Understanding this will help us use the correct cryptographic technique and discover the potential loopholes in a system. In order to do this, we first need to better understand the needs of the system. In order to understand the security requirements, we perform the following three steps:
Identify the entities.
Establish the security goals.
Understand the sensitivity of the data.
Let's look at these steps one by one.