page-header

Tag: Security and usability are often in conflict.

10
Jan

CSCI358 Security Engineering !

Presentation and Report (Worth 10%) The presentation, worth 5%. The report, worth 5%. Each topic is a question appropriate for a debate, and as such they need to be studied to look for arguments in favour and against something.  # Topic A perimeter defence is best placed close to the object being protected. Any system providing anonymity should also allow for traceability. Attacks on information systems are now more likely to be semantic than syntactic. Books such as Anderson’s should not be published, they give too much information to attackers. Bottom up is a better method of threat analysis than top…