List four of the eight common work functions specified in the EBK for building applications and systems security into a project management process.

What will be an ideal response?

1. Establish the IT system and application security engineering program
2. Acquire the necessary resources, including financial resources, to support integration of security in the system development lifecycle (SDLC)
3. Guide IT security personnel through the SDLC phases
4. Provide feedback to developers on security issues through the SDLC
5. Define the scope of the IT security program as it applies to application of the SDLC
6. Plan the IT security program components into the SDLC
7. Collaborate with IT project management to integrate security functions into the project management process
8. Ensure that appropriate changes and improvement actions are implemented as required

Computer Science & Information Technology

You might also like to view...

A technician goes into an office and smells rotten food and body odor. The technician starts gagging and holding his nose. He tells the customer he cannot work in such conditions. The customer complains to the IT supervisor. What issue will the supervisor discuss?

A) Safety B) Being judgmental C) Being proactive D) PPI

Computer Science & Information Technology

Which of the following is true?

a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programming language. c. Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program. d. All of the above.

Computer Science & Information Technology