EBK SOFTWARE ENGINEERING
EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 8220101455970
Author: SOMMERVILLE
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 13, Problem 13.3E

Explanation of Solution

Need for Preliminary risk assessment and design assessment:

The activities undergoing in an organization for identifying and understanding the risk to system and data are known as system risk assessment.

When a new system is developed, throughout its development life cycle different stages of risk assessment are performed.

  • Preliminary Risk assessment:
    • Preliminary risk assessment stage is needed as it identifies the generic risks applicable to systems.
    • Preliminary risk assessment also helps in deciding how to achieve an adequate level of security at a reasonable cost.
    • Preliminary risk assessment consists of data management risk, technical risk, contractual risk and employee risk...

Blurred answer
Students have asked these similar questions
The fact that computer security is almost often considered as an afterthought rather than an integral part of the development process is one of the most significant problems associated with this aspect of the field. In the event that nothing further can be done, it is essential to express the ramifications.
It is recommended to submit a proposal for a security education program. Artifacts that have been finished and polished are assumed to include all their vital parts. The input that was used to create it should be reflected in the final product. The proposal will comprise an executive summary, communication plan, proposal introduction, rules and processes, suggested solutions to security flaws, and methods to continuously monitor the organization for hostile behaviour.
It is recommended to submit a proposal for a security education program. Artifacts that have been finished and polished are supposed to have every part they need. The input that was used to create it should be reflected in the final product. The proposal will include an executive summary, a communication plan, an introduction, rules and processes, suggested solutions to security flaws, and plans to continuously monitor the organization for hostile behaviour.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning