August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 20.1 Reference Monitor Properties
• 20.1.1 Functional Correctness
• 20.2 Simplicity and Minimality Breed Confidence
• 20.3 Separation of Concerns and Evolvability
• 20.4 Security Policy Processing
• 20.4.2 Policy Decision Making
• 20.5 Dependability and Tolerance
• 20.5.1 Cybersecurity Requires Fail Safety
• 20.5.2 Expect Failure: Confine Damages Using Bulkheads
• 20.5.4 Synergize Prevention, Detect-Response, and Tolerance
• Differentiate cybersecurity architecture from the aggregation of widgets. ...