JMU
Security
An Introduction


Prof. David Bernstein
James Madison University

Computer Science Department
bernstdh@jmu.edu


Security Concepts
Categories of Loss/Harm - CIA
Categories of Threats - STRIDE
STRIDE (cont.)
Categories of Threats - IIMF
IIMF vs. STRIDE
Categories of Mitigations/Countermeasures
Vulnerabilities Arise During All Phases of the Software Process
Some Additional Security Concepts