2.4 Security Methods

5. 2.4 Security Methods

Watch

Top-down and bottom-up methods employed in security engineering.

Reflect

  • When considering threats sources other than adversaries one easily ends up in safety analysis. Are there any risks with this, or is it just beneficial when security engineers ends up unifying security with safety engineering?
  • Can you be a security engineer for cyber-physical systems without knowing much about the technological mechanisms available for stopping or mitigating attacks on these systems?