IT SECURITY SERVICE LIFE CYCLE & ESSENTIAL TERMINOLOGIES

IT SECURITY SERVICE LIFE CYCLE


              The IT security services life cycle provides IT security decision makers and managers with a six-phase process by which they can select, implement, and manage IT security services. This Post details the various life cycle phases and the issues and decisions within each phase. As figure illustrates, the security services life cycle has both a linear and iterative component. It proceeds linearly from initiation to implementation to closeout, but the assessment, solution, and operations phases must continually occur for an IT security service to succeed.



The SIX phases are described as follows:

Phase 1: Initiation - The need to initiate the services life cycle is recognized.

Phase 2: Assessment - Before decision makers can implement a service and select a service provider, an accurate portrait of the current environment must be developed.

Phase 3: Solution - decision makers choose the appropriate solution from the viable options identified during the assessment phase.

Phase 4: Implementation - the service and service provider are implemented during the implementation phase.

Phase 5: Operations - the service is operational, the service provider is fully installed, and constant assessment of the service level and performance is made.

Phase 6: Closeout - the environment changes, the need for the service diminishes, or performance deficiencies are noted necessitating a replacement or termination of the IT security service.

 

ESSENTIAL TERMINOLOGIES


  • Threat : An action or event that might compromise security. A treat is a potential violation of security

  • Vulnerability : Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system

  • Target Of Evaluation : An IT system, product, or component that is identified - subjected to require security eveluation

  • Attack : An assault on the system security that is derived from an intelligent threat. An attack is any action that violates security

  • Exploit : A defined way to breach the security of an IT system through vulnerability



- : Thank You For Visit : -

Post a Comment

0 Comments