“First I’ll instruct thee in the rudiments,And then will thou be perfecter than I.”
—CHRISTOPHER MARLOWEDOCTOR FAUSTUS
In Chapter 2 we argued that one of the main principles of software risk management is making the right technology tradeoffs by being directly informed by the business proposition. This is particularly essential when it comes to choosing software security technologies.
This chapter is about comparing and contrasting technologies, and coming up with those that best meet derived requirements. Obviously, this is something that must usually be done early during the life cycle, most often during the course of specifying and designing a system.
Designers and programmers conscientiously select technologies, ...