Security

Security

How to address threats, attacks, vulnerabilities, and countermeasures.

Visual Threats and Countermeasures

While working on patterns & practices Security guidance, I pushed the idea of "Visual Threats and Countermeasures."  I wanted a simple way to...

Security Hot Spots

Security Hot Spots are a lens for security. If you know what you're looking for, you can find it. When you don't know what you're looking for, you can waste a lot of time. The Hot Spots provide a way to find, organize and share software security knowledge. You can use hot spots to share principles, patterns, and practices. You can also use hot spots to share knowledge around threats, attacks, vulnerabilities, and countermeasures. Rather than deal with a laundry list of information, use hot spots to focus your attention on key categories. The Hot Spots are actionable and they are high ROI. The Hot Spots helps you simplify, clarify and gain insight before you elaborate, maximize and optimize.

Threats, Attacks, Vulnerabilities, and Countermeasures

What’s the difference between software threats, attacks, and vulnerabilities?  While working on Improving Web Application security, we found a lot of confusion, so we...

Secure Your Network, Host, and Application

  Having a frame of reference for how to think about security helps you cut through information overload.  While working on our patterns & practices...

Quality Attribute List

When thinking about quality, I tend to draw from the following quality attributes: Availability Buildability Conceptual Integrity Evolvability Extensibility...