1/7
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Asset identification
identify the key system assets that have to be protected
asset value assessment
estimate the value of the identified assets
exposure assessment
assess the potential losses associated with each asset
threat identification
identify the most probable threats to the system assets
attack assessment
decompose threats into possible attacks on the system and the ways that these may occur
control identification
propose the controls that may be put in place to protect an asset
feasibility assessment
assess the technical feasibility and cost of the controls
security requirements definition
security requirements can be infrastructure or application system requirements