Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?
The various security controls in the SDLC design phase are as follows.
Misuse Case Modeling. It is important that the inverse of the misuse cases be modeled to understand and address the security aspects of the software. The requirements traceability matrix can be used to track the misuse cases to the functionality of the software.
Security Design and Architecture Review. This control can be introduced when the teams are engaged in the 'functional' design and architecture review of the software.
Threat and Risk Modeling. Threat modeling determines the attack surface of the software by examining its functionality for trust boundaries, data flow, entry points, and exit points. Risk modeling is performed by ranking the threats as they pertain to the users organization's business objectives, compliance and regulatory requirements and security exposures.
Security Requirements and Test Cases Generation. All the above three security controls, i.e., Misuse Case Modeling, Security Design and Architecture Review, and Threat and Risk Modeling are used to produce the security requirements.
Corazon
5 months agoJesus
5 months agoGerald
5 months agoAntonio
5 months agoMargarita
6 months agoMaia
6 months agoGregg
6 months agoSamuel
6 months agoIsabelle
6 months agoLatosha
6 months agoJulio
6 months agoIndia
6 months agoLindsey
11 months agoHelga
10 months agoKassandra
10 months agoGene
10 months agoMoon
11 months agoGilma
11 months agoSarah
10 months agoLavelle
10 months agoHoward
10 months agoLigia
10 months agoLemuel
10 months agoAnna
11 months agoValda
11 months agoLaine
12 months agoKiera
10 months agoTy
10 months agoMozell
10 months agoVeronika
10 months agoKarma
10 months agoLarae
10 months agoFrederica
11 months agoTasia
11 months agoStephen
12 months agoDierdre
1 year agoAlaine
1 year agoWalker
1 year ago