Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 4 Question 70 Discussion

Actual exam question for ISC2's Information Systems Security Management Professional exam
Question #: 70
Topic #: 4
[All Information Systems Security Management Professional Questions]

Which of the following SDLC phases consists of the given security controls.

Misuse Case Modeling

Security Design and Architecture Review

Threat and Risk Modeling

Security Requirements and Test Cases Generation

Show Suggested Answer Hide Answer
Suggested Answer: A

The various security controls in the SDLC design phase are as follows.

Misuse Case Modeling. It is important that the inverse of the misuse cases be modeled to understand and address the security aspects of the software. The requirements traceability matrix can be used to track the misuse cases to the functionality of the software.

Security Design and Architecture Review. This control can be introduced when the teams are engaged in the 'functional' design and architecture review of the software.

Threat and Risk Modeling. Threat modeling determines the attack surface of the software by examining its functionality for trust boundaries, data flow, entry points, and exit points. Risk modeling is performed by ranking the threats as they pertain to the users organization's business objectives, compliance and regulatory requirements and security exposures.

Security Requirements and Test Cases Generation. All the above three security controls, i.e., Misuse Case Modeling, Security Design and Architecture Review, and Threat and Risk Modeling are used to produce the security requirements.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel