• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
What are the goals of the IATF?
Achieve consensus on a framework for information assurance
Support the development an application that are compatible with the framework.
What areas comprise the defense in depth strategy?
1. Defend the network and the infrastructure.
2. Defending the enclave boundary
3. Defending the computing environment
4. Supporting Infrastructures
What is ISEE defined as?
the art and science of discovering a users information protection needs and then designing and making information systems with economy and elegance so that they can safely resist the force to which they may be subjected
What are the nine phases of the SE according to MIL STD 499B?
Mission requirement analysis
Functional Analysis
Allocation
Synthesis
Logistic Engineering
Life cycle cost analysis
Optimization
Production engineering analysis
Generation of specifications
What is the 5200.2-R systems engineering process?
Requirements Analysis
functional Analysis
Synthesis
What does IEEE 1220-1998 define as the systems engineering process?
Requirements Analysis
Requirements Verification
Functional Analysis/allocation
Functional Verification
Synthesis
Design Verification
What is the IATF systems engineering process?
Discover Needs
Define System requirements
Design system architecture
Develop detailed design
Implement System
Assess effectiveness
What will a good system security engineering professional always keep in mind?
The problem to be solved
True or False: The problem and the solutions space should be kept separate?
True
What is the ISSE process?
Discover Information Protection Needs
Define System Security Requirements
Design System Security Architecture
Developed Detailed Security Design
Implement System Security
Assess Information Protection Effectiveness
Put the following documents in order of creation:
Mission Needs Statement
CONOPS
Information Management Model
CONOPS
Mission Needs Statement
Information Management Model
How is information management defined?
Creating Information
Acquiring Information
Processing Information
Storing and Retrieving Information
Transferring Information
What should the information management model take into account?
The information being processed
Processes being used
Information generators
Information customers
User Roles
Information management policy requirements
regulations
Agreements or contracts
What elements make up the discover information protection needs activity of the ISSE process?
Roles
Responsibilities
threats
Strengths
Security Services
Priorities
Design constraints
What does a preliminary solution set consist of?
CONOPS
system context
system requirements