IT Security Life Cycle:
Review and discuss the IT security life cycle as it relates to how to respond to IT security vulnerabilities and risks, cross referencing to business expectations and the need to provide CIA (confidentiality, integrity, and availability). Students will review and discuss the IT security life cycle as it relates to a particular program or system.
Explain the steps taken at each point in the lifecycle to respond to IT security vulnerabilities and risks. They will cross reference the business expectations and the need to provide CIA. The review should include an analysis of the use of cryptography and user authentication in the system.
Relate changes in security expectations throughout the lifecycle and discuss the reasons for those changes.
NOTE 1: CIA above is (confidentiality, integrity, and availability)
NOTE 2: Our text book is “Information Security Management Handbook, Sixth Edition, Volume 1” if you can use this as a reference that would be great but not required if you can’t.