Modeling Secure Systems

Because this book is about how to build systems with UML, this might be a good place to briefly discuss appropriate ways to model the security interests of an application. In general, the security of a software system is defined by the countermeasures it implements. Five fundamental countermeasures and one organizing countermeasure are common to most secure systems:

  1. Access control: Limiting system functionality to specific users.

  2. Authentication: Identifying someone who has access rights to the system. Related to authentication is identification, which is the attempt to determine a specific identity.

  3. Audit: Logging system activity, especially the activity of a system's users.

  4. Intrusion detection: Detecting unauthorized ...

Get Building Web Applications with UML Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.