Changes between Version 24 and Version 25 of EducationalAssignments/SecurityLayerPartTwo

Changes between Version 24 and Version 25 of EducationalAssignments/SecurityLayerPartTwo

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 24 and Version 25 of EducationalAssignments/SecurityLayerPartTwo

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 24 and Version 25 of EducationalAssignments/SecurityLayerPartTwo

Show
Ignore:
Timestamp:
05/23/12 07:31:49 (7 years ago)
Author:
ericms
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/SecurityLayerPartTwo

    v24 v25  
    1212Three design paradigms are at work in this assignment: accuracy, efficiency, and security. 
    1313 
    14 Accuracy: The security layer should only stop certain actions from being blocked. All other actions should be allowed. 
    15 Efficiency: The security layer should use a minimum number of resources, so performance is not compromised. 
    16 Security: The attacker should not be able to circumvent the security layer. 
     14 * Accuracy: The security layer should only stop certain actions from being blocked. All other actions should be allowed. 
     15 
     16 * Efficiency: The security layer should use a minimum number of resources, so performance is not compromised. 
     17 
     18 * Security: The attacker should not be able to circumvent the security layer. 
    1719 
    1820Within the context of this assignment these design paradigms translate to: