Reference no: EM132232259
Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Security Architecture and Design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. (NOTE:Student is not working)
Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Course Description This course discusses useful models used to address potential threats in software systems and how to apply such models in developing secure software and systems. Areas of study focus on threat modeling strategies, including finding threats, addressing threats, and threat modeling technologies. Major Instructional Areas
1. Understanding threat modeling
2. Strategies for finding threats
3. Techniques for managing threats
4. Validating threat handling activities
5. Understanding environment-specific threats
Course Objectives 1. Explain threat modeling and its importance to secure architecture.
2. Explore strategies for threat modeling.
3. Understand how techniques, such as STRIDE, are useful in finding threats.
4. Find threats using attack trees.
5. Identify threats with attack libraries.
6. Explore privacy tools.
7. Show how to process and manage threats.
8. Employ defensive tactics and technologies.
9. Consider key tradeoffs when addressing threats.
10. Validate that threats are addressed.
11. Survey common threat modeling tools.
12. Develop a repository of requirements.
13. Examine web and cloud threats.
14. Understand user accounts and identity.
15. Explore how human factors and usability affect threat modeling.