SlideShare a Scribd company logo
1.
Identify security objectives
Security objectives are goals and limitations related to
confidentiality, reliability, and access to data and applications.
They include:
· This confidentiality includes protection against the disclosure
of unauthorized information.
· Honesty this includes avoiding unauthorized changes to the
information.
· Availability this includes providing essential services,
including during the attack.
2. Create an Application Overview
At this point, explain what your web application does. Its
purpose is to identify the main characteristics, attributes and
customers of the application. This will help you identify the
threats involved in Step 4
3. Decompose Your Application
At this point, divide the question to identify the limits of faith,
data flow, intervention points, and marking points. You know
more about your system, it is easier to discover threats and find
weaknesses. To destroy your request:
4.
Identify threats
At this point, identify the threats and attacks that affect your
application and affect your security goals(Scandariato,Wuyts, &
Joosen, 2015). These threats are the negative effects that can
occur in your application. To complete this diagnostic process,
bring development members together and evaluate the team to
discuss. Use the board to identify possible threats. The best
team should have software designers, security professionals,
developers, audiences, and system administrators.
5.
Identify the weaknesses
At this point, evaluate your web system's security system and
look at weaknesses. Focus on risk groups as long as you have
identified the threats from the previous step. However, be
careful that the sample questions in this section are designed to
help you identify weaknesses and not threats. An important way
to do this is to explore the cap by software cap, to focus on all
types of risk at each level.

More Related Content

Similar to 1.Identify security objectivesSecurity objectives are go

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
Web Application Security Services in India | Senselearner
Web Application Security Services  in India | SenselearnerWeb Application Security Services  in India | Senselearner
Web Application Security Services in India | Senselearner
Sense Learner Technologies Pvt Ltd
 
Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
Livares Technologies Pvt Ltd
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
TEWMAGAZINE
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
Infosectrain3
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
PallawiBulakh1
 
Cyber Security Company.pdf
Cyber Security Company.pdfCyber Security Company.pdf
Cyber Security Company.pdf
pdfcompressor1
 
Mobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdfMobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdf
Sense Learner Technologies Pvt Ltd
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
ElanusTechnologies
 
The Target breach case Study Assignment.In 2013, Target was the .docx
The Target breach case Study Assignment.In 2013, Target was the .docxThe Target breach case Study Assignment.In 2013, Target was the .docx
The Target breach case Study Assignment.In 2013, Target was the .docx
sarah98765
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
Chandan Singh Ghodela
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
Vskills
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
alinainglis
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
TheWalkerGroup1
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
google
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
IBM Security
 
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docxExplain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
intel-writers.com
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 

Similar to 1.Identify security objectivesSecurity objectives are go (20)

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Web Application Security Services in India | Senselearner
Web Application Security Services  in India | SenselearnerWeb Application Security Services  in India | Senselearner
Web Application Security Services in India | Senselearner
 
Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Cyber Security Company.pdf
Cyber Security Company.pdfCyber Security Company.pdf
Cyber Security Company.pdf
 
Mobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdfMobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdf
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
The Target breach case Study Assignment.In 2013, Target was the .docx
The Target breach case Study Assignment.In 2013, Target was the .docxThe Target breach case Study Assignment.In 2013, Target was the .docx
The Target breach case Study Assignment.In 2013, Target was the .docx
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
 
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docxExplain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 

More from kendahudson

Assignment 2 Case of Anna OOne of the very first cases that caugh.docx
Assignment 2 Case of Anna OOne of the very first cases that caugh.docxAssignment 2 Case of Anna OOne of the very first cases that caugh.docx
Assignment 2 Case of Anna OOne of the very first cases that caugh.docx
kendahudson
 
Assignment 2 Case of Anna OOne of the very first cases that c.docx
Assignment 2 Case of Anna OOne of the very first cases that c.docxAssignment 2 Case of Anna OOne of the very first cases that c.docx
Assignment 2 Case of Anna OOne of the very first cases that c.docx
kendahudson
 
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docx
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docxAssignment 2—Communications Plan and PresentationIn M3 Assignm.docx
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docx
kendahudson
 
Assignment 2 Inclusion versus SegregationOne of the top issues in.docx
Assignment 2 Inclusion versus SegregationOne of the top issues in.docxAssignment 2 Inclusion versus SegregationOne of the top issues in.docx
Assignment 2 Inclusion versus SegregationOne of the top issues in.docx
kendahudson
 
Assignment 2 Case of Anna OOne of the very first cases that cau.docx
Assignment 2 Case of Anna OOne of the very first cases that cau.docxAssignment 2 Case of Anna OOne of the very first cases that cau.docx
Assignment 2 Case of Anna OOne of the very first cases that cau.docx
kendahudson
 
Assignment 2Discussion – Rethinking American OriginsAfter.docx
Assignment 2Discussion – Rethinking American OriginsAfter.docxAssignment 2Discussion – Rethinking American OriginsAfter.docx
Assignment 2Discussion – Rethinking American OriginsAfter.docx
kendahudson
 
Assignment 2.3 Justification Report This is the final sub.docx
Assignment 2.3 Justification Report This is the final sub.docxAssignment 2.3 Justification Report This is the final sub.docx
Assignment 2.3 Justification Report This is the final sub.docx
kendahudson
 
Assignment 2.2Liberty Challenged in Nineteenth Century America .docx
Assignment 2.2Liberty Challenged in Nineteenth Century America .docxAssignment 2.2Liberty Challenged in Nineteenth Century America .docx
Assignment 2.2Liberty Challenged in Nineteenth Century America .docx
kendahudson
 
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docxAssignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
kendahudson
 
Assignment 2Larry Landlord has recently renovated an apartment a.docx
Assignment 2Larry Landlord has recently renovated an apartment a.docxAssignment 2Larry Landlord has recently renovated an apartment a.docx
Assignment 2Larry Landlord has recently renovated an apartment a.docx
kendahudson
 
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docxAssignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
kendahudson
 
Assignment 2Larry Landlord has recently renovated an apartment.docx
Assignment 2Larry Landlord has recently renovated an apartment.docxAssignment 2Larry Landlord has recently renovated an apartment.docx
Assignment 2Larry Landlord has recently renovated an apartment.docx
kendahudson
 
assignment 200 word minimum, APA format, cited and referencednon-pl.docx
assignment 200 word minimum, APA format, cited and referencednon-pl.docxassignment 200 word minimum, APA format, cited and referencednon-pl.docx
assignment 200 word minimum, APA format, cited and referencednon-pl.docx
kendahudson
 
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docxAssignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
kendahudson
 
2 PagesPost your evaluation of leadership style assessments, s
2 PagesPost your evaluation of leadership style assessments, s2 PagesPost your evaluation of leadership style assessments, s
2 PagesPost your evaluation of leadership style assessments, s
kendahudson
 
2 Pages Annotated Bibliography  and Outline separate Pages The to
2 Pages Annotated Bibliography  and Outline separate Pages  The to2 Pages Annotated Bibliography  and Outline separate Pages  The to
2 Pages Annotated Bibliography  and Outline separate Pages The to
kendahudson
 
2 pages work based on the article attached as below The team has
2 pages work based on the article attached as below The team has2 pages work based on the article attached as below The team has
2 pages work based on the article attached as below The team has
kendahudson
 
2 pages.Need someone whose in Communication major.Please wri
2 pages.Need someone whose in Communication major.Please wri2 pages.Need someone whose in Communication major.Please wri
2 pages.Need someone whose in Communication major.Please wri
kendahudson
 
2 page paper Including an abstractThe breakdown of your paper
2 page paper Including an abstractThe breakdown of your paper 2 page paper Including an abstractThe breakdown of your paper
2 page paper Including an abstractThe breakdown of your paper
kendahudson
 
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver 2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
kendahudson
 

More from kendahudson (20)

Assignment 2 Case of Anna OOne of the very first cases that caugh.docx
Assignment 2 Case of Anna OOne of the very first cases that caugh.docxAssignment 2 Case of Anna OOne of the very first cases that caugh.docx
Assignment 2 Case of Anna OOne of the very first cases that caugh.docx
 
Assignment 2 Case of Anna OOne of the very first cases that c.docx
Assignment 2 Case of Anna OOne of the very first cases that c.docxAssignment 2 Case of Anna OOne of the very first cases that c.docx
Assignment 2 Case of Anna OOne of the very first cases that c.docx
 
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docx
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docxAssignment 2—Communications Plan and PresentationIn M3 Assignm.docx
Assignment 2—Communications Plan and PresentationIn M3 Assignm.docx
 
Assignment 2 Inclusion versus SegregationOne of the top issues in.docx
Assignment 2 Inclusion versus SegregationOne of the top issues in.docxAssignment 2 Inclusion versus SegregationOne of the top issues in.docx
Assignment 2 Inclusion versus SegregationOne of the top issues in.docx
 
Assignment 2 Case of Anna OOne of the very first cases that cau.docx
Assignment 2 Case of Anna OOne of the very first cases that cau.docxAssignment 2 Case of Anna OOne of the very first cases that cau.docx
Assignment 2 Case of Anna OOne of the very first cases that cau.docx
 
Assignment 2Discussion – Rethinking American OriginsAfter.docx
Assignment 2Discussion – Rethinking American OriginsAfter.docxAssignment 2Discussion – Rethinking American OriginsAfter.docx
Assignment 2Discussion – Rethinking American OriginsAfter.docx
 
Assignment 2.3 Justification Report This is the final sub.docx
Assignment 2.3 Justification Report This is the final sub.docxAssignment 2.3 Justification Report This is the final sub.docx
Assignment 2.3 Justification Report This is the final sub.docx
 
Assignment 2.2Liberty Challenged in Nineteenth Century America .docx
Assignment 2.2Liberty Challenged in Nineteenth Century America .docxAssignment 2.2Liberty Challenged in Nineteenth Century America .docx
Assignment 2.2Liberty Challenged in Nineteenth Century America .docx
 
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docxAssignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
Assignment 2Terry V.Ohio392 U.S. 1, 88 S. Ct. 1868, 20 L. E.docx
 
Assignment 2Larry Landlord has recently renovated an apartment a.docx
Assignment 2Larry Landlord has recently renovated an apartment a.docxAssignment 2Larry Landlord has recently renovated an apartment a.docx
Assignment 2Larry Landlord has recently renovated an apartment a.docx
 
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docxAssignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
Assignment 2.1 The Public Needs to Know– Draft VersionDue W.docx
 
Assignment 2Larry Landlord has recently renovated an apartment.docx
Assignment 2Larry Landlord has recently renovated an apartment.docxAssignment 2Larry Landlord has recently renovated an apartment.docx
Assignment 2Larry Landlord has recently renovated an apartment.docx
 
assignment 200 word minimum, APA format, cited and referencednon-pl.docx
assignment 200 word minimum, APA format, cited and referencednon-pl.docxassignment 200 word minimum, APA format, cited and referencednon-pl.docx
assignment 200 word minimum, APA format, cited and referencednon-pl.docx
 
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docxAssignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
Assignment 2500-3000 Word Paper (About 10 pages in the Main Body)..docx
 
2 PagesPost your evaluation of leadership style assessments, s
2 PagesPost your evaluation of leadership style assessments, s2 PagesPost your evaluation of leadership style assessments, s
2 PagesPost your evaluation of leadership style assessments, s
 
2 Pages Annotated Bibliography  and Outline separate Pages The to
2 Pages Annotated Bibliography  and Outline separate Pages  The to2 Pages Annotated Bibliography  and Outline separate Pages  The to
2 Pages Annotated Bibliography  and Outline separate Pages The to
 
2 pages work based on the article attached as below The team has
2 pages work based on the article attached as below The team has2 pages work based on the article attached as below The team has
2 pages work based on the article attached as below The team has
 
2 pages.Need someone whose in Communication major.Please wri
2 pages.Need someone whose in Communication major.Please wri2 pages.Need someone whose in Communication major.Please wri
2 pages.Need someone whose in Communication major.Please wri
 
2 page paper Including an abstractThe breakdown of your paper
2 page paper Including an abstractThe breakdown of your paper 2 page paper Including an abstractThe breakdown of your paper
2 page paper Including an abstractThe breakdown of your paper
 
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver 2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
2 jazz essays, one of the topic is Paul Whiteman, Joe Oliver
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

1.Identify security objectivesSecurity objectives are go

  • 1. 1. Identify security objectives Security objectives are goals and limitations related to confidentiality, reliability, and access to data and applications. They include: · This confidentiality includes protection against the disclosure of unauthorized information. · Honesty this includes avoiding unauthorized changes to the information. · Availability this includes providing essential services, including during the attack. 2. Create an Application Overview At this point, explain what your web application does. Its purpose is to identify the main characteristics, attributes and customers of the application. This will help you identify the threats involved in Step 4 3. Decompose Your Application At this point, divide the question to identify the limits of faith, data flow, intervention points, and marking points. You know more about your system, it is easier to discover threats and find weaknesses. To destroy your request: 4.
  • 2. Identify threats At this point, identify the threats and attacks that affect your application and affect your security goals(Scandariato,Wuyts, & Joosen, 2015). These threats are the negative effects that can occur in your application. To complete this diagnostic process, bring development members together and evaluate the team to discuss. Use the board to identify possible threats. The best team should have software designers, security professionals, developers, audiences, and system administrators. 5. Identify the weaknesses At this point, evaluate your web system's security system and look at weaknesses. Focus on risk groups as long as you have identified the threats from the previous step. However, be careful that the sample questions in this section are designed to help you identify weaknesses and not threats. An important way to do this is to explore the cap by software cap, to focus on all types of risk at each level.