- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 105字
- 2021-07-14 11:04:28
Security risk considerations in acquisitions, strategy, and practice
Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:
- Security requirements analysis and specifications
- Security risks in the processing of data
- Need for cryptographic controls
- Risks in system operations
- Risks in development and support processes
- Technical vulnerability management
- Risks in outsourced software development
Note
Note that detailed information and best practices are provided in various chapters throughout this book.
推薦閱讀
- 新編Visual Basic程序設計上機實驗教程
- 數據庫原理及應用(Access版)第3版
- Python機器學習:數據分析與評分卡建模(微課版)
- 單片機C語言程序設計實訓100例:基于STC8051+Proteus仿真與實戰
- Essential Angular
- Learning Apache Kafka(Second Edition)
- Julia Cookbook
- Python算法從菜鳥到達人
- 程序設計基礎教程:C語言
- ANSYS Fluent 二次開發指南
- C語言程序設計與應用(第2版)
- Visual Basic程序設計(第三版)
- Kotlin Programming By Example
- Struts 2.x權威指南
- Oracle 12c從入門到精通(視頻教學超值版)