Question

In: Computer Science

What will you review and assess in the User Domain as part of this security assessment?

What will you review and assess in the User Domain as part of this security assessment?

Solutions

Expert Solution

Security Assessment and Testing—Introduction

The goal of security assessment and testing is early identification of technical, operational, and system deficiencies so that appropriate and timely corrective actions can be applied before using the system in the production environment. Creating a test and evaluation strategy involves:

  • Planning for technology development and risk

  • Evaluating the system design against project requirements

  • Identifying where competitive prototyping and other evaluation techniques fit in the process

Let us discuss assessment and test strategies in the next section.

Assessment and Test Strategies

A well-planned and well-executed assessment and test strategy can provide valuable information about risk and risk mitigation.

A security practitioner:

  • Must develop assessment and test strategies supporting development and acquisition programs

  • Can recommend test and evaluation techniques to help in evaluating and managing risks

  • Can formulate plans and procedures to be used by the testing team

The assessment and test strategy is generally executed by a working group known as the Integrated Product Team or IPT consisting of subject matter experts, customer user representatives, and other stakeholders. The strategy should be updated as and when required.


Related Solutions

What will you review and assess within the Workstation Domain as part of this security assessment?
What will you review and assess within the Workstation Domain as part of this security assessment?
What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?
What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model?
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model? Is this important to an organization with an Internet presence? Why?
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the...
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the graphics , types of alarms and how is fixed. Explain potential sites for leaks
Develop a process to assess the security posture of the service provider. What security requirements should...
Develop a process to assess the security posture of the service provider. What security requirements should your organization have? Define security requirements in a cloud-based environment that should be part of your standard.
What tasks and deliverables are needed to implement "User Domain" risk mitigation recommendations?
What tasks and deliverables are needed to implement "User Domain" risk mitigation recommendations?
What are the five steps when carrying out to workplace Risk Assessment? How do you assess...
What are the five steps when carrying out to workplace Risk Assessment? How do you assess the risk assessment related to the health and safety point of view
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT