Designing secure code
nSecurity design by Threat Modelling:
nBrainstorm the known threats to the system
nRank the threats by decreasing risk
nChoose how to respond to the threats
nChoose techniques to mitigate the threats
nChoose the appropriate technologies from the identified techniques
n