4.3 Security Across the Technology Life Cycle

Description

Implement security activities across the technology life cycle.
DJ Perrone
Flashcards by DJ Perrone, updated more than 1 year ago
DJ Perrone
Created by DJ Perrone almost 7 years ago
9
1

Resource summary

Question Answer
What is considered in the end-to-end ownership? Operational activities, maintenance, commissioning/decommissioning, disposal, reuse
What is an operational activity? day to day operations
What are a few asset disposal terms? - Data purging - Data clearing - Remanence
What is SDLC? Systems Development Life Cycle
What are the 5 steps of SDLC? - Initiate - Acquire / Develop - Implement - Operate / Maintain - Dispose
What is STRM? Security Requirements Traceability Matrix
What are the steps of a vulnerability cycle? Network => Service => Application => Client => Organization => Repeat
Show full summary Hide full summary

Similar

notas de quimica
oscar ariza
WAVES
toritorx
Spanish Vocabulary- Beginner
ThomasK
To Kill A Mockingbird GCSE English
naomisargent
HSC Maths: Algebra Quiz
Brad Hegarty
Cell structure F211 OCR AS Biology
helen.rebecca
Strength and Limitations of research methods
Isobel Wagner
Atomic Structure
dpr898
Acids, Bases and Salts
asramanathan
How to Study Smart
Abdou Mohamed