learning objectives: * define design patterns * define secure design patterns * give an example of a secure design pattern and describe it (intent, motivation, applicability, etc.) activities: * Read Software-Security Patterns: Degree of Maturity - http://dl.acm.org/ft_gateway.cfm?id=2855364&type=pdf * Skim Secure Design Patterns - https://resources.sei.cmu.edu/asset_files/TechnicalReport/2009_005_001_15110.pdf extra: * watch and review any DEFCON / BlackHat video - post title, link, review on Piazza assignments: * Design Pattern Discussion - pick a pattern from "Secure Design Patterns" (sections 2,3,4) - read about the pattern - prepare for discussion about the pattern + topics of discussion include (but are not limited to): relationship to secure design principles, relationship to deadly sins, relationship to touchpoints (mcgraw), applicability to Secure Logging assignment, applicability to BiBiFi project, research on detection of patterns in code/design, known cases of misuse/abuse/unuse (can you point out a breach/failure that was made possible/easier because the pattern was not used/used improperly?)