Computer Science  >  Study Notes  >  Domain 6: Security Assessment and Testing Western Governors UniversityCISSP 101Notes - Domain 6 - ED (All)

Domain 6: Security Assessment and Testing Western Governors UniversityCISSP 101Notes - Domain 6 - EDT_JAN18

Document Content and Description Below

Domain 6: Security Assessment and Testing SLIDE 3: Domain Objectives • Plan for technology development, including risk • Evaluate the system design against mission requirements • Identify wh ... ere competitive prototyping and other evaluation techniques fit in the process SLIDE 4: Domain Agenda • Design and Validate Assessment and Test Strategies • Conduct Security Control Testing • Collect Security Process Data • Conduct or Facilitate Internal and Third‐Party Audits Design and Validate Assessment and Test Strategies SLIDE 6: Module Topics • Introduction • Roles • Verification and Validation SLIDE 7: The Role of the Systems Engineer and Security ProfessionalD6 P2 v.01_2018 SLIDE 8: The Role of the Working Group • Updates to test and evaluation strategy • Ensure test and evaluation processes are consistent with the acquisition strategy • Ensure user's capability‐based operational requirements are being met by the system SLIDE 9: Verification Software verification ‐ provides objective evidence that the design produces / provides the results of a particular phase in respect to the software development life cycle. It will provide the assurance of compliance with the specified requirements for that phase. Software verification looks for consistency, completeness, and correctness of the software and its supporting documentation as it is being developed. It also supports a subsequent conclusion that the software is validated. Software testing is one of many types of verification activities. It is intended to confirm that software development output meets its input requirements. Other verification activities include: Static and Dynamic analyses, code and document inspections, and walkthroughs. SLIDE 10: Validation Validation is a matter of developing a “level of confidence” that the software or system meets all requirements and user expectations as documented. Identifies the following: defects found in specifications documents, amount of defects remaining, and testing coverage. This will be used to develop an acceptable level of confidence before deploying the product. The level of confidence, and therefore the level of software validation, verification, and testing effort required, will vary depending on the safety risk (hazard) posed by the system. [Show More]

Last updated: 3 years ago

Preview 1 out of 54 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Domain 6: Security Assessment and Testing Western Governors UniversityCISSP 101Notes - Domain 6 - EDT_JAN18 document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$11.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

141
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 05, 2021

Number of pages

54

Written in

All

Seller


Profile illustration for Cheryshev
Cheryshev

Member since 4 years

102 Documents Sold

Reviews Received
6
4
1
0
1
Additional information

This document has been written for:

Uploaded

Aug 05, 2021

Downloads

 0

Views

 141

Document Keyword Tags

Recommended For You

Get more on Study Notes »

$11.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·