User Activities
¨ Identify system security threats and objectives by
doing a risk assessment
¨ Identify cost-effective technical security
countermeasures
¨ Identify complementary environmental security
countermeasures
¨ Determine confidence required in the system
security functions
¨ Correlate threats and objectives with the
functional and environmental security
countermeasures and confidence requirements
600.436 High-
Assurance Systems
Fall 01/Introduction
17