Abstract
This chapter examines how to architect and design systems that accomplish the security goals covered in Chapter 1. We first spend some time discussing prototypical threats to software, and then discuss how to design security into applications from the beginning. We focus on a number of high-level approaches and trade-offs, and discuss how security is sometimes perceived to be at odds with factors such as convenience and usability. We also discuss the concept of “security by obscurity” and why it is usually not sufficient. We look at security as a game of economics and risk management. Some of the approaches and design principles we cover in this chapter and the next were for the first time described in Jerome Saltzer and Michael Schroeder’s paper, “The Protection of Information in Computer Systems”—we bring them to life and illustrate them with many real-world examples.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Neil Daswani, Christoph Kern, and Anita Kesavan
About this chapter
Cite this chapter
(2007). Secure Systems Design. In: Foundations of Security. Apress. https://doi.org/10.1007/978-1-4302-0377-3_2
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0377-3_2
Publisher Name: Apress
Print ISBN: 978-1-59059-784-2
Online ISBN: 978-1-4302-0377-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books