Security risk considerations in acquisitions, strategy, and practice

Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:

  • Security requirements analysis and specifications
  • Security risks in the processing of data
  • Need for cryptographic controls
  • Risks in system operations
  • Risks in development and support processes
  • Technical vulnerability management
  • Risks in outsourced software development

Note

Note that detailed information and best practices are provided in various chapters throughout this book.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.95.74