- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 105字
- 2021-07-14 11:04:28
Security risk considerations in acquisitions, strategy, and practice
Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:
- Security requirements analysis and specifications
- Security risks in the processing of data
- Need for cryptographic controls
- Risks in system operations
- Risks in development and support processes
- Technical vulnerability management
- Risks in outsourced software development
Note
Note that detailed information and best practices are provided in various chapters throughout this book.
推薦閱讀
- Learning Single:page Web Application Development
- Java入門經典(第6版)
- MongoDB for Java Developers
- Mastering Entity Framework
- 編寫高質量代碼:改善Python程序的91個建議
- C#程序設計教程
- Neo4j Essentials
- Functional Programming in JavaScript
- JavaScript:Moving to ES2015
- Learning Unreal Engine Android Game Development
- R用戶Python學習指南:數據科學方法
- INSTANT Yii 1.1 Application Development Starter
- IoT Projects with Bluetooth Low Energy
- Akka入門與實踐
- Elasticsearch搜索引擎構建入門與實戰