4 SECURITY LIFE CYCLES

In this chapter we discuss the life cycle of information that, in turn, drives the security issues that arise from the development, testing and implementation of new software. The ongoing life cycle of software is also a concern and is addressed here too.

You should gain an understanding of the importance and appropriateness of audit and review processes, of effective change control and of configuration management. You will learn about the differences in security between open source and propriety solutions, commercial off-the-shelf software and bespoke systems, and certified and non-certified systems. You will also learn about some of the techniques involved in reducing the security risks in the development of code. ...

Get Information Security Management Principles, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.