Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Applying Security Engineering Principles to Complex Composite Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Purpose
- 3 Neals Background
- 4 Why are Composite Systems Hard to Secure
- 5 Modern Development Environments
- 6 Types of Users
- 7 Smart City Example
- 8 Inputs and outputs
- 9 Principles
- 10 Principle 1 Mission
- 11 Safety
- 12 Security
- 13 Data
- 14 Smart City
- 15 Understanding Security
- 16 Secrets
- 17 Integrity
- 18 Secret
- 19 End user passwords
- 20 Malicious insiders
- 21 Transit insiders
- 22 Cloud providers
- 23 Example
- 24 Plan for Failure
- 25 Maintaining Security
- 26 Decommissioning
- 27 Conclusion