Using the security system development lifecycle secSDLC, identify secSDLC phases and describe common steps for each phase

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Having policies in place can mitigate the risk of physical security breaches
C-suites and SBOs (Small Business Owners) indicated external threats from vendors or contractors
(25% C-suites; 18% SBOs) and physical loss or theft of sensitive information (22% C-suites, 19%
SBOs) are the top information security threats facing their business.
Yet, the number of organizations with a known and understood policy for storing and disposing of
confidential paper documents adhered to by all employees has declined 13% for C-suites (73% in 2019
to 60% in 2020) and 11% for SBOs (57% in 2019 to 46% in 2020).
In addition, 49% of SBOs have no policy in place for disposing of confidential information on end-of-life
electronic devices.
While the work-from-home trend has risen over the years, the COVID-19 pandemic abruptly launched
employees into work-from-home status, many without supporting policies.
77% of C-suites and 53% of SBOs had employees who regularly or periodically work off-site. Despite
this trend, 53% of C-suites and 41% of SBOs have remote work policies in place that are strictly
adhered to by employees working remotely (down 18% from 71% in 2019 for C-suites; down 8% from
49% in 2019 for SBOs).
“As we adjust to our new normal in the workplace, or at home, it’s crucial that policies are adapted to
align with these changes and protect sensitive information,” said Cindy Miller, president and CEO,
Stericycle.
“As information security threats grow, it’s more important than ever that we help businesses and
communities protect valuable documents and data from the risks of an information breach.”

 

5.2 The C-suites and SBOs (Small Business Owners) are planning to build a security system to identify and prevent malicious attacks posing a risk to physical loss or theft of sensitive information. Using the security system development lifecycle secSDLC, identify secSDLC phases and describe common steps for each phase.

Expert Solution
Step 1

Answer:

The Security System Development Life Cycle (SecSDLC) is used to follows the same terminology that is commonly known as System Development Life Cycle (SDLC) but they do contrast within the particular of the exercises performed in each phase. Both the SecSDLC and the SDLC comprise of the taking after stages:

1. Investigation phase 

2. Analysing phase 

3. Logical Designing phase 

4. Physical Designing phase

5. Implementation phase 

6. Maintenance phase

 

steps

Step by step

Solved in 3 steps

Blurred answer
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education