Review-discuss the it security life cycle


Project description:

Review and discuss the IT security life cycle as it relates to how to respond to IT security vulnerabilities and risks, cross referencing to business expectations and the need to provide CIA (confidentiality, integrity, and availability). Students will review and discuss the IT security life cycle as it relates to a particular program or system.

Students will explain the steps taken at each point in the lifecycle to respond to IT security vulnerabilities and risks. They will cross reference the business expectations and the need to provide CIA. The review should include an analysis of the use of cryptography and user authentication in the system.

Students will relate changes in security expectations throughout the lifecycle and discuss the reasons for those changes.

NOTE 1: CIA above is (confidentiality, integrity, and availability)

NOTE 2: Our text book is “Information Security Management Handbook, Sixth Edition, Volume 1” if you can use this as a reference that would be great but not required if you can’t.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Review-discuss the it security life cycle
Reference No:- TGS01434258

Expected delivery within 24 Hours