Computer Science  >  EXAM  >  WGU, Information Security and Assurance (C725), SET II | 100 Questions with 100% Correct Answers (All)

WGU, Information Security and Assurance (C725), SET II | 100 Questions with 100% Correct Answers

Document Content and Description Below

After determining the potential attack concepts, the next step in threat modeling is to perform ______________ analysis. ______________ analysis is also known as decomposing the application, system, ... or environment. The purpose of this task is to gain a greater understanding of the logic of the product as well as its interactions with external elements.Also known as decomposing the application - ✔✔Reduction analysis Whether an application, a system, or an entire environment, it needs to be divided into smaller containers or compartments. Those might be subroutines, modules, or objects if you're focusing on software, computers, or operating systems; they might be protocols if you're focusing on systems or networks; or they might be departments, tasks, and networks if you're focusing on an entire business infrastructure. Each identified subelement should be evaluated in order to understand inputs, processing, security, data management, storage, and outputs. Trust Boundaries, Data Flow Paths, Input Points, Privileged Operations, Details about Security Stance and Approach - ✔✔The Five Key Concepts in the Decomposition process. In the decomposition process, any location where the level of trust or security changes. - ✔✔Trust Boundaries In the decomposition process, the movement of data between locations - ✔✔Data Flow Paths In the decomposition process, locations where external input is received - ✔✔Input Points In the decomposition process, any activity that requires greater privileges than of a standard user account or process, typically required to make system changes or alter security - ✔✔Privileged Operations In the decomposition process, the declaration of the security policy, security foundations, and security assumptions - ✔✔Details about Security Stance and Approach The concept that most computers, devices, networks, and systems are not built by a single entity. - ✔✔supply chain T or F [Show More]

Last updated: 3 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of WGU, Information Security and Assurance (C725), SET II | 100 Questions with 100% Correct Answers document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Also available in bundle (1)

Click Below to Access Bundle(s)

Bundle for WGU C725 Tests Compilation

Bundle for WGU C725 Tests Compilation

By Tessa 3 years ago

$39

8  

Reviews( 0 )

$12.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

105
0

Document information


Connected school, study & course


About the document


Uploaded On

Jun 28, 2022

Number of pages

14

Written in

All

Seller


Profile illustration for Tessa
Tessa

Member since 3 years

561 Documents Sold

Reviews Received
83
31
21
3
21
Additional information

This document has been written for:

Uploaded

Jun 28, 2022

Downloads

 0

Views

 105

Document Keyword Tags

Recommended For You

Get more on EXAM »

$12.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·