- 1、本文档共7页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)(系统开发生命周期(SDLC))
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
The most effective way to protect information and information systems is to integrate
security into every step of the system development process, from the initiation of a
project to develop a system to its disposition. The multistep process that starts with the
initiation, analysis, design, and implementation, and continues through the maintenance
and disposal of the system, is called the System Development Life Cycle (SDLC).
The Information Technology Laboratory of the National Institute of Standards and
Technology (NIST) recently updated its general guide that helps organizations plan for
and implement security throughout the SDLC. The revised guide provides basic
information about the comprehensive approach that NIST has developed for managing
risks to systems and for providing the appropriate levels of information security based on
the levels of risk. Federal agencies are directed to incorporate security controls and
services into the SDLC under the Federal Information Security Management Act
(FISMA) and Office of Management and Budget (OMB) Circular A-130, Appendix III.
NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the
System Development Life Cycle
Revision 2 of NIST SP 800-64, Security Considerations in the System Development Life
Cycle, was developed by Richard Kissel, Kevin Stine, and Matthew Scholl of NIST, with
the expert assistance of Hart Rossman, Jim Fahlsing, and Jessica Gulick, of Science
Applications International Corporation (SAIC). In addition, many individuals in the
public and private sectors contributed to the revision by reviewing it and providing
constructive comments.
The guide focuses on the information security components of the SDLC. One section
summarizes the relationships between the SDLC and other information
您可能关注的文档
- The Search for a Rolle's Theorem in the Complex (寻找一个复杂的罗尔定理).pdf
- The Secret University of Texas Medical Branch(德克萨斯大学医学分支的秘密).pdf
- The Secret of Hydraulic Schematics (液压示意图的秘密).pdf
- The Secret Science of the Stock Market(股票市场的秘密的科学).pdf
- The Secret To Living A Longer, Healthier Life (的秘密生活更长、更健康的生活).pdf
- THE SELFCLINCHING FASTENER HANDBOOK(SELFCLINCHING紧固件手册).pdf
- THE SECURITY OF ELECTRONIC BANKING(电子银行的安全).pdf
- The selfcleaning filter for continuous filtration. (连续式过滤器过滤。).pdf
- THE SELECTIVE FUNCTIONAL MOVEMENT (选择性的功能性运动).pdf
- The Sensible Guide to Forex Verbundzentrale (明智的外汇Verbundzentrale指南).pdf
文档评论(0)