CHAPTER
2 Cybersecurity Right-Think
Overview
• 2.2 The Cybersecurity Trade-off: Performance and Functionality
• 2.2.6 Quantity of Service or Product
• 2.2.7 Quality of Service or Product
• 2.2.8 Cost of Service or Product
• 2.3 Theories of Security Come from Theories of Insecurity
• 2.4 They Come at You Through the Weeds
• 2.5 Top-Down Meets Bottom-Up
• 2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument
Learning Objectives
• Learn that the primary metric of cybersecurity is risk and its components.
• Understand the trade-off ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.