4.3 Security Across the Technology Life Cycle

Description

Implement security activities across the technology life cycle.
DJ Perrone
Flashcards by DJ Perrone, updated more than 1 year ago
DJ Perrone
Created by DJ Perrone about 7 years ago
10
1

Resource summary

Question Answer
What is considered in the end-to-end ownership? Operational activities, maintenance, commissioning/decommissioning, disposal, reuse
What is an operational activity? day to day operations
What are a few asset disposal terms? - Data purging - Data clearing - Remanence
What is SDLC? Systems Development Life Cycle
What are the 5 steps of SDLC? - Initiate - Acquire / Develop - Implement - Operate / Maintain - Dispose
What is STRM? Security Requirements Traceability Matrix
What are the steps of a vulnerability cycle? Network => Service => Application => Client => Organization => Repeat
Show full summary Hide full summary

Similar

notas de quimica
oscar ariza
Cold War (1945-1975)
sagar.joban
French Tense Endings
James Hoyle
History - Medicine through Time
Alice Love
Pe - Principles of Training
Beccadf 1
PHR SPHR Labor Union Terminology
Sandra Reed
MATTERS OF LIFE AND DEATH - UNIT 1, SECTION 2 - RELIGIOUS STUDIES GCSE EDEXCEL
Khadijah Mohammed
Mind Maps with GoConqr
Elysa Din
SalesForce ADM 201 Study Quiz
Kristin Bunn
Účto Fífa 4/6
Bára Drahošová