Security

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 05:08, 25 March 2007 (edit)
Admin (Talk | contribs)

← Previous diff
Revision as of 05:10, 25 March 2007 (edit)
Admin (Talk | contribs)

Next diff →
Line 20: Line 20:
|- |-
| style="color:#000"|<div style="padding-left:1em"> | style="color:#000"|<div style="padding-left:1em">
-* <font size=3>'''[[Threats and Countermeasures]]'''</font> - This section focuses on threats, attacks, vulnerabilities and countermeasures. +[[Image:CountermeasuresCenter.jpg|Countermeasures Center |left|]] <font size=3>'''[[Threats and Countermeasures]]'''</font> - This section focuses on threats, attacks, vulnerabilities and countermeasures.
<br clear="all" /> <br clear="all" />
-* <font size=3>'''[[Security Engineering]]'''</font> - This section includes specific security techniques that help you meet your security objectives.+[[Image:SecurityEngineeringCenter.gif|Security Engineering |left|]] <font size=3>'''[[Security Engineering]]'''</font> - This section includes specific security techniques that help you meet your security objectives.
<br clear="all" /> <br clear="all" />
-* <font size=3>'''[[Security Inspections]]'''</font> - This section focuses on performing design, code, and deployment inspections to improve software quality.+[[Image:InspectionCenter.gif|Security Inspections |left|]] <font size=3>'''[[Security Inspections]]'''</font> - This section focuses on performing design, code, and deployment inspections to improve software quality.
<br clear="all" /> <br clear="all" />
-* <font size=3>'''[[Threat Modeling]]'''</font> - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk. +[[Image:ThreatModelingCenter.gif|Threat Modeling |left|]] <font size=3>'''[[Threat Modeling]]'''</font> - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk.
<br clear="all" /> <br clear="all" />

Revision as of 05:10, 25 March 2007

Welcome to Security Guidance Share! This section features security specific guidance. Use security engineering to shape software security throughout the life cycle. Use threat modeling to help you identify your key security design issues. Use security design, code, and deployment inspections to implement proven practices. Use the software threats, attacks, vulnerabilities and countermeasures to understand security issues and apply appropriate defenses.


Focus Centers

Threats and Countermeasures - This section focuses on threats, attacks, vulnerabilities and countermeasures.


Security Engineering - This section includes specific security techniques that help you meet your security objectives.


Security Inspections - This section focuses on performing design, code, and deployment inspections to improve software quality.


Threat Modeling - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk.



Tech Centers

Knowledge Base

Resources



. . .

Personal tools