Match each term with the correct statement below.

A. The most common form of joint review activity
B. Should drive the execution of the security function throughout the conventional lifecycle of the development and maintenance process.
C. The evaluation of the likelihood and impact of a given threat
D. Include both the functional requirements for security as well as the security properties that the applications and systems should possess
E. Allows the producer and the customer to reach a common understanding concerning the security status and progress of an ongoing project
F. The purpose is to conceptualize and communicate the precise structure of the product
G. Rational control of change based on a formal process
H. Uses a team approach to define, design, and evaluate work products
I. The set of formal processes used to ensure confidence in software and systems


A. Technical review
B. Policies
C. Risk assessment
D. Specification stage
E. Project status monitoring
F. Design stage
G. Configuration management
H. Joint review process
I. Software assurance

Computer Science & Information Technology

You might also like to view...

When using computers, what is the most common source of problems?

a. hardware failures b. human error c. Internet outages d. software failures

Computer Science & Information Technology

A prerequisite for installing the self-service portal is Routing and Remote Access Services.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Adobe ____ provides a set of tools to create a display of images on the Web.

a. Bridge b. Photomerge c. Photos d. Web Master

Computer Science & Information Technology

Economies of ________ refers to the cost-savings gained by an increase in production

Fill in the blank(s) with correct word

Computer Science & Information Technology