We must:
Assume hostile environment
Design with security in mind
“Defensive Programming”
Identify security risks
Design with security in mind
Budget for increased cost of “Defensive Programming”
Previous slide
Next slide
Back to first slide
View graphic version