4.3 Security Across the Technology Life Cycle

Descripción

Implement security activities across the technology life cycle.
DJ Perrone
Fichas por DJ Perrone, actualizado hace más de 1 año
DJ Perrone
Creado por DJ Perrone hace alrededor de 7 años
10
1

Resumen del Recurso

Pregunta Respuesta
What is considered in the end-to-end ownership? Operational activities, maintenance, commissioning/decommissioning, disposal, reuse
What is an operational activity? day to day operations
What are a few asset disposal terms? - Data purging - Data clearing - Remanence
What is SDLC? Systems Development Life Cycle
What are the 5 steps of SDLC? - Initiate - Acquire / Develop - Implement - Operate / Maintain - Dispose
What is STRM? Security Requirements Traceability Matrix
What are the steps of a vulnerability cycle? Network => Service => Application => Client => Organization => Repeat
Mostrar resumen completo Ocultar resumen completo

Similar

notas de quimica
oscar ariza
ADMINISTRACION
edward.chonon
sinonimos I
Kioshi Gonzales
English: Phrasal Verbs
maya velasquez
Crisis de 1929 Nazismo Segunda Guerra Mundial Guerra Fría Naciones Unidas
Fabian Pais
Investigación
silvanoperazaiti
VERB TENSES
cesartorres721
Recursos de Biología para Selectividad
Diego Santos
Plantilla para Presentar Trabajos con Mapas Mentales
Diego Santos
MAPA DE ACTORES DE ACOMPAÑAMIENTO PSICOSOCIAL DESDE LA PSICOLOGIA JURIDICA A VICTIMAS DE LA CONFRONTACION ARMADA.
JUAN CARLOS VELEZ LOPEZ