List four of the eight common work functions specified in the EBK for building applications and systems security into a project management process.

What will be an ideal response?


1. Establish the IT system and application security engineering program
2. Acquire the necessary resources, including financial resources, to support integration of security in the system development lifecycle (SDLC)
3. Guide IT security personnel through the SDLC phases
4. Provide feedback to developers on security issues through the SDLC
5. Define the scope of the IT security program as it applies to application of the SDLC
6. Plan the IT security program components into the SDLC
7. Collaborate with IT project management to integrate security functions into the project management process
8. Ensure that appropriate changes and improvement actions are implemented as required

Computer Science & Information Technology

You might also like to view...

Which of the following is a table of MAC addresses and port mapping used by a switch to identify connected network devices?

a. CAM b. ARP c. ARP-A d. ipconfig /all

Computer Science & Information Technology

The potential for unauthorized access is usually limited to the entry points of a network.

a. true b. false

Computer Science & Information Technology

In the bubble sort, the list at any moment is divided into two sublists: sorted and unsorted. The smallest element is bubbled from the unsorted sublist and moved to the sorted sublist.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is an unnormalized design, and how do you convert an unnormalized design to 1NF? In your answer, refer to specific pages and figures in this chapter.

What will be an ideal response?

Computer Science & Information Technology