Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
What are the goals of the IATF?
|
Achieve consensus on a framework for information assurance
Support the development an application that are compatible with the framework. |
|
What areas comprise the defense in depth strategy?
|
1. Defend the network and the infrastructure.
2. Defending the enclave boundary 3. Defending the computing environment 4. Supporting Infrastructures |
|
What is ISEE defined as?
|
the art and science of discovering a users information protection needs and then designing and making information systems with economy and elegance so that they can safely resist the force to which they may be subjected
|
|
What are the nine phases of the SE according to MIL STD 499B?
|
Mission requirement analysis
Functional Analysis Allocation Synthesis Logistic Engineering Life cycle cost analysis Optimization Production engineering analysis Generation of specifications |
|
What is the 5200.2-R systems engineering process?
|
Requirements Analysis
functional Analysis Synthesis |
|
What does IEEE 1220-1998 define as the systems engineering process?
|
Requirements Analysis
Requirements Verification Functional Analysis/allocation Functional Verification Synthesis Design Verification |
|
What is the IATF systems engineering process?
|
Discover Needs
Define System requirements Design system architecture Develop detailed design Implement System Assess effectiveness |
|
What will a good system security engineering professional always keep in mind?
|
The problem to be solved
|
|
True or False: The problem and the solutions space should be kept separate?
|
True
|
|
What is the ISSE process?
|
Discover Information Protection Needs
Define System Security Requirements Design System Security Architecture Developed Detailed Security Design Implement System Security Assess Information Protection Effectiveness |
|
Put the following documents in order of creation:
Mission Needs Statement CONOPS Information Management Model |
CONOPS
Mission Needs Statement Information Management Model |
|
How is information management defined?
|
Creating Information
Acquiring Information Processing Information Storing and Retrieving Information Transferring Information |
|
What should the information management model take into account?
|
The information being processed
Processes being used Information generators Information customers User Roles Information management policy requirements regulations Agreements or contracts |
|
What elements make up the discover information protection needs activity of the ISSE process?
|
Roles
Responsibilities threats Strengths Security Services Priorities Design constraints |
|
What does a preliminary solution set consist of?
|
CONOPS
system context system requirements |