Discussion Post Assignments | Online Homework Help
June 10th, 2019
ISOL-536 Security Architecture & Design
Don't use plagiarized sources. Get Your Assignment on
Discussion Post Assignments | Online Homework Help
Just from $13/Page
Dr. Sherri Brinson
Dept. of Information Technology &
School of Computer and Information Sciences
University of the Cumberlands
Summer First BiTerm 2019 – Week 5 Assignment
[ Your Name Here ]
As you have read the chapter and watched the lecture on chapter 10 and 12 from your textbox, your assignment this week is using the following guidelines:
Chapter 10: Validating That Threats Are Addressed
- Explain the difference between Mitigation Testing and Penetrating Testing (75-100 words).
- List five major items that should be included in constructing a Software Model.
- Explain the reason Documenting Assumptions are important in threat modeling (75-100 words).
Chapter 12: Requirements Cookbook
- Explain how the interplay of Requirements, Threats, and Mitigation all work together (75-100 words).
- Why is it important to use People/Process/Technology/ as a Frame for requirements (75-100 words)?
- Why are the Seven Laws of Identity important (75-100 words)?