Design Tactics - Security


Design tactics, based on the book 'Software Architecture in Practice' by Len Bass et al.

= 12 items (filtered by ) /
  • Resisting Attacks
    Nonrepudiation, confidentiality, integrity, and assurance.
    • Authenticate Users
      Ensure that a user or remote computer is actually who it purports to be.
      • Authorize Users
        Ensure that an authenticated user has the rights to access and modify either data or services.
        • Maintain Integrity
          Use redundant information, such as checksums or hash results, to ensure that data are delivered as intended.
          • Limit Exposure
            Design systesm sot that limited services are available on each host.
            • Limit Access
              Restrict access based on message source or destination port.

              Identification: Audit TrailRestoration: AvailabilityRecovering From AttacksIntrusion DetectionDetecting AttacksLimit AccessLimit ExposureMaintain IntegrityMaintain Data ConfidentialityAuthorize UsersAuthenticate UsersResisting AttacksSecurity Design Tactics