Principlesfo
f
esig
, Makingsecur f
• Flawed approach: Design an
f f f
ignore security at first
f f f
• Add security once the functiona
f f f f
sfied
• Better approach: Build secur
f f f
• Incorporate security- f
minded thinking into all phases
f f f f f
, Developmen
Four common phases of development
f f f f
• Requirements
• Design
• Implementation
• Testing/assurance
, Developmen
f
esig
, Makingsecur f
• Flawed approach: Design an
f f f
ignore security at first
f f f
• Add security once the functiona
f f f f
sfied
• Better approach: Build secur
f f f
• Incorporate security- f
minded thinking into all phases
f f f f f
, Developmen
Four common phases of development
f f f f
• Requirements
• Design
• Implementation
• Testing/assurance
, Developmen