ISSAP – Security Architecture Analysis

 

Risk Analysis

  • Quantitative Risk Analysis
  • Qualitative Risk Analysis
  • Risk Theory
  • Attack Vectors
  • Methods of Vector Attack
  • Attack By Email
  • Attack By Deception
  • Hoaxes
  • Hackers
  • Web Page Attack
  • Attack of the Worms
  • Malicious Macros
  • Instant Messaging, IRC, P2P File Sharing Networks
  • Viruses
  • Asset And Data Value
  • Corporate Versus Departmental Valuation
  • Business, Legal and regulatory Requirements

Product Assurance Evaluation Criteria

  • CC
  • TOE
  • EAL
  • EAL1-7
  • CC Assurance Paradigm
  • Significance of Vulnerabilities
  • The Causes of Vulnerabilities
  • Common Criteria Assurance

Assurance Through Evaluation

  • CC Assurance Scale
  • ISO/IEC 27000 Series
  • SEI
  • CMMI
  • Introducing the CMM
  • Sources of the CMM
  • Structure of the CMMI-DEV v1.3
  • Inter group Coordination
  • Peer Reviews
  • ISO 7498
  • Concepts of a Layered Architecture
  • PCI-DSS
  • Architectural Solutions

Architecture Frameworks

  • DoDAF
  • Zackman Framework

Design Process

  • System Security Engineering Methodologies
  • Design Validation
  • Certification
  • Peer Reviews
  • Documentation

 

Leave Comment

Your email address will not be published. Required fields are marked *

UA-46837009-1