IT Security Life Cycle

Person-Situation Interaction
August 7, 2017
Marketing concept
August 7, 2017
Show all

IT Security Life Cycle

IT Security Life Cycle

Project description

Review and discuss the IT security life cycle as it relates to how to respond to IT security vulnerabilities and risks, cross referencing to business expectations and the need to provide CIA (confidentiality, integrity, and availability). Students will review and discuss the IT security life cycle as it relates to a particular program or system.

Students will explain the steps taken at each point in the lifecycle to respond to IT security vulnerabilities and risks. They will cross reference the business expectations and the need to provide CIA. The review should include an analysis of the use of cryptography and user authentication in the system.

Students will relate changes in security expectations throughout the lifecycle and discuss the reasons for those changes.

NOTE 1: CIA above is (confidentiality, integrity, and availability)

NOTE 2: Our text book is “Information Security Management Handbook, Sixth Edition, Volume 1? if you can use this as a reference that would be great but not required if you can’t.


Leave a Reply

Your email address will not be published. Required fields are marked *