Please enable JavaScript.
Coggle requires JavaScript to display documents.
5 - Understand Security Capabilities of Information Systems - Coggle…
5 - Understand Security Capabilities of Information Systems
Memory protection
Prevent an active process from interacting with an area of memory that was not specifically assigned or allocated to it
Virtualization
Tool to isolate operating systems, test suspicious software, or implement other security protections
Trusted Platform Module (TPM)
Used to implement a broad range of cryptography-based security protection mechanisms (e.g. store and process cryptographic keys for a hardward-supported or OS-implemented local storage device encryption system)
TPM is an example of Hardware Security Module (HSM)
Interfaces
A constrained or restricted interface is implemented within an application to restrict what users can do or see based on their privileges
Fault Tolerance
Ability of a system to suffer a fault but continue to operate (e.g. RAID disks
Encryption/Decryption
Information System Life Cycle
Stakeholders' Need and Requirements
Identify and understand the needs, expectations, and requirements of stakeholders who will interact with the IS
Requirements Analysis
Detailed examination of these requirements: functional and non-functional requirements, constraints, alignment with overall goals
Architectural Design
Blueprint for the information system is created, defining the overall structure
Development/Implementation
Actual coding and development of the IS
Integration
Combine different modules or components of the systems to ensure they work together seamlessly
Verification and Validation
Confirm that the developed system meets the requirements
Verification = each component works correctly
Validation = the system fulfills its intended goal
Transition/Deployment
Migrate the environment from the dev env to the production
Operations and Maintenance/Sustainment
Retirement/Disposal