Requirements analysis of security functions

In this step, security plans are developed that determine security requirements for the information systems and contain the information pertaining to a selection of security controls, how these controls have to be implemented, and so on. Security controls are commonly of three types—administrative, logical, or technical and physical controls:

  • Administrative controls are the policies, standards, or guidelines specifying and governing the security requirements of a program
  • Technical controls are virtual controls, such as firewalls, anti-virus software, identification, and authentication mechanisms and passwords
  • Physical controls may refer to a key that can give access to buildings or rooms, monitoring systems such as surveillance systems, gates, and even security personnel who monitor access to offices
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.98.108