Professional Documents
Culture Documents
:
Name :
Justify the reasons with appropriate parameters exist behind the comparison for given table 3-5.
1
10
2 Use a tabulation to relate the attack pattern components with your own example.
10
3 Demonstrate a security assurance case example in order to assert and specify the desired security
10
properties with neat schematic diagram.
4 Apply your own creative inputs and outputs for the respective techniques and participants
10
involved in the nine steps of the SQUARE process model.
5 Demonstrate a source code in C language with sample I/O, for insecure coding which can be
exploited by attackers such as ‘Buffer overflow Attacks’. 10
Page 1 of 1