Beyond Software Architecture[c] Creating and Sustaining Winning Solutions

  • The accompanying table provides you with a way to check the various kinds of security discussed in this chapter. How do you fare?

Type of Security

Assessment

Digital identity management

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Transaction security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Software security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Information security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Категории