10:53 Apr 15, 2021 |
Russian to English translations [PRO] Tech/Engineering - IT (Information Technology) | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Sergiy Butkov Ukraine Local time: 12:19 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
4 +1 | on the edge of |
| ||
4 | trust boundaries |
| ||
3 | In the sphere of |
|
on the edge of Explanation: Как по мне, не лучше и не хуже других вариантов, но именно в текстах по кибербезопасности любят употреблять это слово... |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
trust boundaries Explanation: https://jdmeier.com/how-to-use-threat-modeling/ Identify your application’s trust boundaries to help focus your analysis on areas of concern. Trust boundaries indicate where trust levels change. You can think of trust from the perspective of confidentiality and integrity. For example, a change in access control levels in your application where a specific role or privilege level is required to access a resource or operation would be a change in trust level. Another example would be at an entry point in your application where you might not fully trust the data passed to the entry point. To help identify trust boundaries: Start by identifying your outer system boundaries. For example, your application can write to files on server X, it can make calls to the database on server Y, and it can call Web service Z. This defines your system boundary. Identify access control points or the key places where access requires additional privileges or role membership. For example, a particular page might be restricted to managers. The page requires authenticated access and also requires that the caller is a member of a particular role. Identify trust boundaries from a data flow perspective. For each subsystem, consider whether the upstream data flow or user input is trusted, and if it is not, consider how the data flow and input can be authenticated and authorized. Knowing which entry points exist between trust boundaries allows you to focus your threat identification on these key entry points. For example, you are likely to have to perform more validation on data passed through an entry point at a trust boundary. |
| |
Login to enter a peer comment (or grade) |
In the sphere of Explanation: In the sphere of protection... When it comes to protection... Мне кажется, автор здесь просто несколько высокопарно выразился. |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.