INTRODUCTIONSHORTCOMINGS OF CRITERIA STANDARDS FOR SECURITY ASSESSMENTSAPPLYING THE MCCUMBER CUBE METHODOLOGY FOR PRODUCT ASSESSMENTSSTEPS FOR PRODUCT AND COMPONENT ASSESSMENTINFORMATION FLOW MAPPINGDEFINE THE BOUNDARYTAKE AN INVENTORY OF INFORMATION RESOURCES AND COMPONENTSDECOMPOSE AND IDENTIFY ALL INFORMATION STATESCUBE DECOMPOSITION BASED ON INFORMATION STATESCALL OUT THE INFORMATION STATE COLUMNDECOMPOSE BLOCKS BY ATTRIBUTEIDENTIFY EXISTING AND POTENTIAL VULNERABILITESDEVELOP SECURITY ARCHITECTUREDESCRIBE REQUIRED SAFEGUARDSCOST OUT ARCHITECTURE COMPONENTS AND ENFORCEMENT MECHANISMSRECAP OF THE METHODOLOGY FOR SUBSYSTEMS, PRODUCTS, AND COMPONENTSREFERENCES