7

ISSE Model Phase 6: Assess Security Effectiveness

Introduction

The phases in the Information Systems Security Engineering (ISSE) life-cycle model are:

1.  Discover Information Protection Needs. Ascertain why the system needs to be built and what information needs to be protected.
2.  Define System Security Requirements. Define the system in terms of what security is needed.
3.  Define System Security Architecture. Define the security functions needed to meet the specific security requirements.
4.  Develop Detailed Security Design. Based on the security architecture, design the security functions and features for the system.
5.  Implement System Security. Following the documented security design, build and implement the security ...

Get Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.