ABSTRACT

In Part II of this book, a series of six detailed architectural analyses was presented. Each of these was meant to build upon the skills of the previous assessment while, at the same time, introducing one or more new security architecture problems and their possible solutions. There is no doubt in my mind that I’ve omitted some goals and details: A number of the exclusions were purposive in order to keep the book tightly focused as a course in applied security architecture and threat modeling. And, as was noted previously, these are fictional architectures. Architectures in the real world tend to be even messier than these examples. And throughout the analyses, I have avoided digging down into implementation details, even though these engineering aspects are also critical to the delivery of secure systems.