vulnerabilities
exploit
dangling vulnerability
dangling threat
attack
passive attack
active attack
unintentional attack
Inadvertant disclosure
security posture
risk
Risk Management
risk acceptance
Risk Avoidance
risk mitigation
risk transfer
threat actor
target information system
attack surface
exposure
comprise
indicator
consequences
trust
trust mechanism
trusted computing base
Assurance
trusted management
controlling interaction(actions,principals,policies, and credentials)
life cycle
waterfall model
security system life cycle
System evaluation
configuration management
Delivery Operations
Development
Guidance Documentation
Life Cycle
Test
Vulnerabilitiy Assessment
Maintenance Assurance
1, Requirements
2, Design
3, Coding
4, Testing
5, Deployment
6, Production
7, Decommission
keynote 1999
xacml 2009
software engineering
viega and mcgraw
assess assets
assess threats
assess vulnerabilities
assess risk
prioritize countermeasures options
make risk management decision
