Security

Security Threat and Vulnerability Mitigation Patterns: A Case of Credit Card Theft Mitigation

Free registration required

Executive Summary

Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that one needs a lot of knowledge in developing secure systems, but it is difficult to obtain sufficient knowledge and use it correctly as security incident reports and security standards are often described informally and without context and rationale to justify and guide when each recommended security measure should be used, especially when conflicting forces exist.

  • Format: PDF
  • Size: 415.98 KB