CHAPTER
1 What’s the Problem?
Overview
• 1.1 Baking in Trustworthiness: Design-Time
• 1.2 Operational Perspective: Basic Questions
• 1.2.2 What Is the Nature of the Attack?
• 1.2.3 What Is the Mission Impact So Far?
• 1.2.4 What Is the Potential Mission Impact?
• 1.2.7 What Are They Trying to Do?
• 1.2.8 What Is the Attacker’s Next Step?
• 1.2.9 What Can I Do About It?
• 1.2.10 What Are My Options and How Effective Will Each Option Be?
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.