We have a Web Server that takes username and passwords as input
and of logs users in to our system
a) Identify information assets and prioritize them out of 5 (5
most critical, 0 no importance)
b) Create 3 threats to your information assets (e.g. Threat1:
attackers can obtain passwords by ...) (not asking for lengthy
paragraphs of what threats there is in web servers)
c) Address threats you created by security requirements (At
least 1 for each) (Requirements should be brief. e.g.
Requirement1-forThreat1: Passwords will be .... before they are
sent to the database server.)
d) Create at least 1 design item for each security requirement
(e.g. DesignItem1forRequirement1: ... will be used for ... of the
passwords)
We have a Web Server that takes username and passwords as input and of logs users in to our system a) Identify informati
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am