4.3 Security Across the Technology Life Cycle

Descripción

Implement security activities across the technology life cycle.
DJ Perrone
Fichas por DJ Perrone, actualizado hace más de 1 año
DJ Perrone
Creado por DJ Perrone hace más de 6 años
7
1

Resumen del Recurso

Pregunta Respuesta
What is considered in the end-to-end ownership? Operational activities, maintenance, commissioning/decommissioning, disposal, reuse
What is an operational activity? day to day operations
What are a few asset disposal terms? - Data purging - Data clearing - Remanence
What is SDLC? Systems Development Life Cycle
What are the 5 steps of SDLC? - Initiate - Acquire / Develop - Implement - Operate / Maintain - Dispose
What is STRM? Security Requirements Traceability Matrix
What are the steps of a vulnerability cycle? Network => Service => Application => Client => Organization => Repeat
Mostrar resumen completo Ocultar resumen completo

Similar

notas de quimica
oscar ariza
Comunidades Autónomas de España y sus Capitales
maya velasquez
Esterilización, desinfección y antisepsia
ana.karen94
Historia de Al-Ándalus
maya velasquez
Test Ortografía
Omar Vazquez Flores
PLASTICIDAD CEREBRAL
Kareen Gatica
Plantilla para Presentar Trabajos con Mapas Mentales
Diego Santos
Glucólisis
Nadim Bissar
Test de Ecuaciones Factorizadas
MANUEL LUIS PÉREZ SALAZAR