Skip to Main Content
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
book

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

by O. Sami Saydjari
August 2018
Intermediate to advanced content levelIntermediate to advanced
512 pages
17h 18m
English
McGraw-Hill
Content preview from Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Index

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

A

abstraction, 340, 341–343, 347

abstraction, levels of, 67–68

access control, 200–210

attribute-based, 207–210

considerations, 105

covert channels, 205–206

discretionary, 201–205, 370

identity-based, 206–207

mandatory, 203–205

policy-based, 356, 358–360

access control decisions, 215

access control lists (ACLs), 202, 373

access control matrix, 200–201

access rights, 200–201

ACLs (access control lists), 202, 373

acquired-knowledge secrets, 40–42

active data, 56, 57

actuation, 20–21

actuators, 20, 417

adaptability, 147

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

Nancy R. Mead, Carol C. Woody
Security Chaos Engineering

Security Chaos Engineering

Kelly Shortridge, Aaron Rinehart

Publisher Resources

ISBN: 9781260118186