4.3 Security Across the Technology Life Cycle

Beschreibung

Implement security activities across the technology life cycle.
DJ Perrone
Karteikarten von DJ Perrone, aktualisiert more than 1 year ago
DJ Perrone
Erstellt von DJ Perrone vor etwa 7 Jahre
10
1

Zusammenfassung der Ressource

Frage Antworten
What is considered in the end-to-end ownership? Operational activities, maintenance, commissioning/decommissioning, disposal, reuse
What is an operational activity? day to day operations
What are a few asset disposal terms? - Data purging - Data clearing - Remanence
What is SDLC? Systems Development Life Cycle
What are the 5 steps of SDLC? - Initiate - Acquire / Develop - Implement - Operate / Maintain - Dispose
What is STRM? Security Requirements Traceability Matrix
What are the steps of a vulnerability cycle? Network => Service => Application => Client => Organization => Repeat
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

notas de quimica
oscar ariza
Öff. Recht - Grundrechte Streite
myJurazone
Flipped Classroom Modell
Laura Overhoff
Karteikarten Angewandte Sozialpsychologie
Sarah Rettätsfro
Grundzüge Soziologischer Theorien - Rudolf Richter 2017 - Version 2
Markus Gio
Vetie - Klausur Tierhaltung und Tierhygiene 2018
E. König
Vetie - Innere Medzin 2018
Fioras Hu
Bildungspsychologie und Evaluation
Daniel Martinovic
Vetie Geflügelkrankheiten Altfragen
Tropsi B
Vetie: Geflügelkrankheiten Fragebogen 4
Björn Sake