Posted: December 2nd, 2014

IT Security Life Cycle

IT Security Life Cycle

Project description
Review and discuss the IT security life cycle as it relates to how to respond to IT security vulnerabilities and risks, cross referencing to business expectations and the need to provide CIA (confidentiality, integrity, and availability). Students will review and discuss the IT security life cycle as it relates to a particular program or system.

Students will explain the steps taken at each point in the lifecycle to respond to IT security vulnerabilities and risks. They will cross reference the business expectations and the need to provide CIA. The review should include an analysis of the use of cryptography and user authentication in the system.

Students will relate changes in security expectations throughout the lifecycle and discuss the reasons for those changes.

NOTE 1: CIA above is (confidentiality, integrity, and availability)

NOTE 2: Our text book is “Information Security Management Handbook, Sixth Edition, Volume 1” if you can use this as a reference that would be great but not required if you can’t.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp