官术网_书友最值得收藏!

Security risk considerations in acquisitions, strategy, and practice

Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:

  • Security requirements analysis and specifications
  • Security risks in the processing of data
  • Need for cryptographic controls
  • Risks in system operations
  • Risks in development and support processes
  • Technical vulnerability management
  • Risks in outsourced software development

Note

Note that detailed information and best practices are provided in various chapters throughout this book.

主站蜘蛛池模板: 湖南省| 绩溪县| 金寨县| 安达市| 韶山市| 新乡县| 临泉县| 蒙阴县| 绩溪县| 嘉义市| 高陵县| 朝阳区| 银川市| 太谷县| 沛县| 文化| 绥德县| 伊宁县| 五寨县| 贞丰县| 乌鲁木齐市| 夏邑县| 秭归县| 甘肃省| 五河县| 洛宁县| 阳城县| 广丰县| 桐庐县| 达尔| 老河口市| 望谟县| 莱芜市| 丰都县| 红河县| 神农架林区| 曲靖市| 东兴市| 莆田市| 东光县| 金乡县|