6005CEM Week 2
Last week we introduced the concept of security.
-
The Three pillars of cyber security covers distinct areas: People, Processes and Infrastructure. Each of these areas represents a different threat to the security of software and an organisation
-
The CIA Triangle gives us a set of "requirements": To maintain the Confidentiality, Availably, and Integrity, of our software and processes.
This week is our second week of background theory, where we are going to take a closer look at Security Policy and how they map across to the concepts above.
What are the legal requirements when it comes to data? How can we encourage the writing of secure software?
For the lab element we will look at security audit, and how we can examine systems logs for signs of a security breach,
Topics Covered
- GDPR
- Developing with GDPR in mind.
Lab Task
In this weeks lab we will look at the design and audit process. And develop a specification for a piece of software.
Extra Task
We continue the first stage of the BFF Challenge. You can carry on writing your program to show secret messages.