SOFTWARE ENGINEERING >C<
SOFTWARE ENGINEERING >C<
null Edition
ISBN: 9781323165331
Author: SOMMERVILLE
Publisher: PEARSON C
Textbook Question
Chapter 13, Problem 13.1E

Explain the important differences between application security engineering and infrastructure security engineering.

Expert Solution & Answer
Check Mark

Explanation of Solution

Difference between application security engineering and infrastructure security engineering:

While considering security issues, one needs to consider both application software and the infrastructure on which system is built.

The difference between application security engineering and infrastructure security engineering are mentioned below:

Application Security EngineeringInfrastructure Security Engineering
Application security engineering is a problem in software engineering where engineers should ensure that the system is designed to resist attacks.Infrastructure Security Engineering is management problem in which the system manages to configure the infrastructure to resist attacks.
It is important as software engineering is concerned with the evolution and development of systems that can resist malicious attacks.As infrastructures components are widely available, the majority of attacks hence focus on system infrastructures.
Application security improves the security of an application often by finding, fixing and preventing security vulnerabilities.System managers have to set up the infrastructure in order to make effective use of infrastructure security features available and fix the infrastructure security vulnerabilities.
It uses software, hardware, and procedural methods to protect applications from external threats. 

It is primarily concerned with making sure that data in any form is kept secure in terms of preserving its confidentiality, integrity and availability.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
03:15
Students have asked these similar questions
Two security architecture models should be contrasted.
Distinguish the major components of a security multilayer vulnerability management strategy.
Two alternative security architecture models should be compared and contrasted.
Knowledge Booster
Recommended textbooks for you
  • Principles of Information Security (MindTap Cours...
    Computer Science
    ISBN:9781337102063
    Author:Michael E. Whitman, Herbert J. Mattord
    Publisher:Cengage Learning
    Management Of Information Security
    Computer Science
    ISBN:9781337405713
    Author:WHITMAN, Michael.
    Publisher:Cengage Learning,
  • Principles of Information Security (MindTap Cours...
    Computer Science
    ISBN:9781337102063
    Author:Michael E. Whitman, Herbert J. Mattord
    Publisher:Cengage Learning
    Management Of Information Security
    Computer Science
    ISBN:9781337405713
    Author:WHITMAN, Michael.
    Publisher:Cengage Learning,