CHAPTER
20 Architecting Cybersecurity
Overview
• 20.1 Reference Monitor Properties
• 20.1.1 Functional Correctness
• 20.2 Simplicity and Minimality Breed Confidence
• 20.3 Separation of Concerns and Evolvability
• 20.4 Security Policy Processing
• 20.4.2 Policy Decision Making
• 20.5 Dependability and Tolerance
• 20.5.1 Cybersecurity Requires Fail Safety
• 20.5.2 Expect Failure: Confine Damages Using Bulkheads
• 20.5.4 Synergize Prevention, Detect-Response, and Tolerance
Learning Objectives
• Differentiate cybersecurity architecture from the aggregation of widgets. ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.