官术网_书友最值得收藏!

Security risk considerations in acquisitions, strategy, and practice

Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:

  • Security requirements analysis and specifications
  • Security risks in the processing of data
  • Need for cryptographic controls
  • Risks in system operations
  • Risks in development and support processes
  • Technical vulnerability management
  • Risks in outsourced software development

Note

Note that detailed information and best practices are provided in various chapters throughout this book.

主站蜘蛛池模板: 崇左市| 浦北县| 时尚| 平和县| 余干县| 莱州市| 青阳县| 安徽省| 盐山县| 忻城县| 靖江市| 盐城市| 晋州市| 衡南县| 新沂市| 昌宁县| 泌阳县| 台北市| 攀枝花市| 开封市| 陇南市| 丹阳市| 红河县| 平定县| 龙门县| 长沙市| 东乡族自治县| 绥宁县| 蓝田县| 靖州| 霍邱县| 青岛市| 新干县| 靖西县| 武山县| 二连浩特市| 新兴县| 长武县| 仲巴县| 宜良县| 和龙市|