Security Engineering

3 Security Engineering Copyright Doug Knehr

Click on the above link for a condensed view (not all links opened) of my deep research and expertise in security engineering covering the following areas:

Information Security Architecture
information systems security evaluation models
security capabilities of information systems
vulnerabilities and security architectures
Technology and process integration
Single Point of Failure SPOF
Client-based vulnerabilities
Consider the following options when defining mobile device security architecture
Server-based vulnerabilities
Data flow control
Database security
Software and System Vuylnerailities and Threats
Vulnerabilities in Mobile Systems
Vulnerabilities in Embedded Devices and Cyber Physical Systems
Cryptography – Application and Use
Site and facility design considerations
Site planning
design and implement facility security
Implementation and operation of facilities security
Physical Security