The intent of the Software Assurance Knowledge Unit is to provide students with the ability to describe why software assurance is important to the development of secure systems and describe the methods and techniques that lead to secure software.
- Apply modeling techniques and vulnerability mapping to evaluate potential security issues.
- l. Usability
- Describe examples of the application of Security Principles
- Compare and contrast the security of alternative designs
- Review Secure Design Patterns
- Evaluate the level of security required for system data.
- Apply Life of Data - N-order Scope Map
- Create an Audit Trail
- Increase Resiliency
- Design reviews
- Describe examples of the application of Security Principles:
- Apply security design principles.
- Describe how system design and architecture affects security.
- Create a system design optimized to meet appropriate security requirements.
- Apply modeling and vulnerability assessment to create a secure design.
- Explain the importance of Design Reviews in creating secure systems.
- Explain the importance of Design Reviews in creating secure systems
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
||Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
||Knowledge of human-computer interaction principles.
||Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
||Skill in assessing the predictive power and subsequent generalizability of a model.
||Skill in the use of design modeling (e.g., unified modeling language).