Chapter 1 Flashcards

1
Q

Set of cohesive tasks within a process.

A

Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.

A

Adequate Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An undesirable consequence associated with a loss.

A

Adverse Consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process an organization employs to determine whether security controls are defined as system-specific, hybrid, or common.

A

Allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process an organization employs to assign security controls to specific information system components responsible for providing a particular security capability (e.g., router, server, remote sensor, etc.).

A

Allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An analytical comparison or evaluation of proposed approaches to meet an objective.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be applied to anything — from a large military acquisition decision to a decision between two products.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The formal or informal process involves identifying key decision factors — such as lifecycle operations, support, training, sustainment costs, risks, and effectiveness— and assessing each option with respect to these factors.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An analytical comparison if the operational effectiveness, cost, and risks of proposed materiel solutions to gaps and shortfalls in operational capability.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analyses that document the rationale for identifying/recommending a preferred solution or solutions to the identified shortfall.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can be triggered by threat changes, deficiencies, obsolescence of existing systems, or advances in technology.

A

Analysis of Alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software program hosted by an information system.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A set of related physical and logical representations (i.e., views) of a system or a solution.

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Conveys information about system/solution elements, interconnections, relationships, and behavior at different levels of abstractions and with different scopes.

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fundamental concepts or properties of a system in its environment embodied in its elements, relationships, and the principles of its design and evaluation.

A

Architecture (System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A work product used to express an architecture.

A

Architecture Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Conventions, principles, and practices for the description of architecture established within a specific domain of application and/or community of stakeholders.

A

Architecture Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A method for evaluating architecture-level designs that considers multiple attributes including modifiability, security, performance, and reliability, to gain insight as to whether the fully described architecture will meet its requirements.

A

Architecture Trade-off Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identifies trade-off points among multiple attributes (e.g., modifiability, security, performance, reliability, etc.), facilitates communication among stakeholders (e.g., customer, developer, maintainer, etc.) from the perspective of each attribute, clarifies and refines requirements, and provides a framework for an ongoing, concurrent process of system design and analysis.

A

Architecture Trade-off Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A work product expressing the architecture of a system from the perspective of specific system concerns.

A

Architecture View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hardware, software, and relevant documentation for an information system at a given point in time.

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Formally approved version of a configuration item, regardless of media, formally designated and fixed at a specific time during the configuration item’s lifecycle.

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.

A

Baseline Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical or logical perimeter of a system.

A

Boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A set of instructions for a computer.

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

System of communication in which arbitrary groups of letters, numbers, or symbols represent units if plain text of varying length.

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A system element.

A

Component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Effect (change or non-change) usually associated with an event or condition or with the system and usually allowed, facilitated, caused, prevented, changed, or contributed to by the event, condition, or system.

A

Consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Factors that impose restrictions and limitations on the system or actual limitations associated with the use of the system.

A

Constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A basic unit of information that has a unique meaning and subcategories (data items) of distinct value (e.g., gender, race, geographic location, etc.).

A

Data Element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The property that data has not been altered in an unauthorized manner and covers data in storage, during processing, and while in transit.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A requirement that is implied or transformed from a higher-level requirement.

A

Derived Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cannot be assessed since they are not contained in any requirements baseline.

A

Derived Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Must trace back to at least one higher level requirement.

A

Derived Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Process of defining the system elements, interfaces, and other characteristics of a system of interest in accordance with the requirements and architecture.

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Analysis that is focused on determining the design approach that is best suited for implementing the elements, physical safeguards, and procedural measures of the system.

A

Design Trade-off Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Includes the following considerations: whether technical elements, physical safeguards, or procedural measures are appropriate to implement the system security requirements; and whether acquiring an off-the-shelf product, accessing or developing a service, or custom development is appropriate to implement the system security requirements.

A

Design Trade-off Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An environment or context that includes a set of system resources and a set of system entities that have the right to access the resources as defined by a common security policy, security model, or security architecture.

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

System that supports a system-of-interest during its lifecycle stages but does not necessarily contribute directly to its function during operation.

A

Enabling System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The individuals on the systems engineering team with security responsibilities, systems engineers that are part of the systems engineering team, or a combination thereof.

A

Engineering Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Context determining the setting and circumstances of all influences upon a system.

A

Environment (System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A network not controlled by the organization.

A

External Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A mode of termination of system functions that prevents damage to specified system resources and system entities (i.e., specified data, property, and life) when a failure occurs or is detected in the system (but the failure might still cause a security compromise).

A

Fail Safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A mode of termination of system functions that prevents loss of secure state when a failure occurs or is detected in the system (but the failure might still cause damage to some system resource or system entity).

A

Fail Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Selective termination of affected, non-essential system functions when a failure occurs or is detected in the system.

A

Fail Soft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Computer programs and data stored in hardware — typically in read-only memory (ROM) or programmable read-only memory (PROM) — such that the programs and data cannot be dynamically written or modified during execution of the programs.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The material components of an information system.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Aggregate of directives, regulations, and tules that prescribe how an organization manages, protects, and distributes information.

A

Information Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.

A

Information System (IS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

All components of an information system to be authorized for operation by an authorizing official, excluding separately authorized systems, to which the information system is connected.

A

Information System Boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The ability of an information system to continue to: (i) operate under adverse conditions or stress, even in a degraded or debilitated state, while maintaining essential operational capabilities; and (ii) recover to an effective operational posture in a time frame consistent with mission needs.

A

Information System Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Individual assigned responsibility for conducting information system security engineering activities.

A

Information Systems Security Engineer (ISSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Process that captures and refines information security requirements and ensures their integration into information technology component products and information systems through purposeful security design or configuration.

A

Information Systems Security Engineering (ISSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency.

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Includes computers, ancillary equipment, software, firmware and similar products, services (including support services), and related resources.

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Guarding against improper information modification or destruction; includes ensuring information non-repudiation and authenticity.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Common boundary between independent systems or modules where interactions take place.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A network where: (i) the establishment, maintenance, and provisioning of security controls are under the direct control of organizational employees or contractors; and (ii) cryptographic encapsulation or similar security technology provides the same effect.

A

Internal Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A network that is typically organization-owned, yet may be organization-controlled while not being organization-owned.

A

Internal Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Information system(s) implemented with a collection of interconnected components.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information.

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Access to this implies access to the information it contains.

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An entity of any size, complexity, or positioning within an organizational structure (e.g., a federal agency, or, as appropriate, any of its operational elements).

A

Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Statement that translates or expresses a need and its associated constraints and conditions.

A

Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A condition or capability that must be met or possessed by a system or system element to satisfy a contract, standard, specification, or other formally imposed documents.

A

Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The protective measures prescribed to meet the security requirements (e.g., confidentiality, integrity, and availability) specified for an information system.

A

Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

May include security features, management constraints, personnel security, and security of physical structures, areas, and devices.

A

Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s risk management approach.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system.

A

Security Control Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A domain that implements a security policy and is administered by a single authority.

A

Security Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

An interdisciplinary approach and means to enable the realization of secure systems.

A

Security Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Focuses on defining customer needs, security protection requirements, and required functionality early in the systems development lifecycle, documenting requirements, and the proceeding with design, synthesis, and system validation while considering the complete problem.

A

Security Eningeering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A set of criteria for the provision of security services.

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Requirements levied on an information system that are derived from applicable laws, executive orders, directives, policies, standards, instructions, regulations, procedures, or organizational mission/business case needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.

A

Security Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Description of the minimum requirements necessary for an information system to maintain an acceptable level of risk.

A

Security Requirements Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Matrix documenting the system’s agreed-upon security requirements derived from all sources, the security features’ implementation details and schedule, and the resources required for assessment.

A

Security Requirements Traceability Matrix (SRTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Within a volume of time and space, the perception of an enterprise’s security posture and its threat environment; the comprehension/meaning of both taken together (risk); and the projection of their status into the near future.

A

Situational Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Computer programs (stored and executed by computer hardware) and associated data ( stored in hardware) that may be dynamically written or modified during execution.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Generally an individual, process, or device causing information to flow among objects or change to the system state.

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Attacks that allow the adversary to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products), or services at any point during the lifecycle.

A

Supply Chain Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Often done using implants or other vulnerabilities inserted prior to installation.

A

Supply Chain Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

The risk that and adversary may sabotage, maliciously introduce unwanted function, or otherwise subvert the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of an item of a supply or a system so as to surveil, deny, disrupt, or otherwise degrade the function, use, or operation of a system.

A

Supply Chain Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

A systematic approach for managing supply chain risk by identifying susceptibilities, vulnerabilities, and threats throughout the supply chain and developing mitigation strategies to combat those threats whether presented by the supplier, the supplies product and its subcomponents, or the supply chain (e.g., initial production, packaging, handling, storage, transport, mission operation, and disposal).

A

Supply Chain Risk Management (SCRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Any organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a set of specific functions.

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

The scope of activities associated with a system, encompassing the system’s initiation, development and acquisition, implementation, operation and maintenance, and ultimately its disposal that instigates and other system initiation.

A

System Development Lifecycle (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

A specialty engineering field strongly related to systems engineering that applies scientific, engineering, and information assurance principles to deliver trustworthy systems that satisfy stakeholder requirements within their established risk tolerance.

A

Systems Security Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

The process by which a security control baseline is modified based on (i) the application of scoping guidance, (ii) the specification of compensating security controls, if needed, and (iii) the specification of organization-defined parameters in the security controls via explicit assignment and selection statements.

A

Tailoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

An intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data.

A

Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system.

A

Technical Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Understanding the capabilities and intentions of adversaries as revealed by their targeting actions, also known as the modern threat space.

A

Systems Security Engineer Design Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Identifying stakeholder assets and protection needs and provide protection countermeasures with the criticality of those assets and needs and the consequences of asset loss.

A

Systems Security Engineer Design Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Understanding the growing complexity of systems to more effectively analyze, manage, and address the uncertainty associated with that complexity.

A

Systems Security Engineer Design Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Integrating security requirements, functions, and services into mainstream management and technical processes within the lifecycle processes of systems

A

Systems Security Engineer Design Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Building trustworthy secure systems capable of protecting stakeholder assets.

A

Systems Security Engineer Design Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Not meeting a specified requirement, objective, or performance measure; adversity; disruption; hazard; threat; or bad things that happen.

A

System Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Intentional causing of system failure.

A

Forced system Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Unintentional causing of system failure.

A

Unforced System Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Engineering the security functions that provide system security capability.

A

Systems Security Engineer Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Engineering the security-driven constraints for all system functions.

A

Systems Security Engineer Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Engineering and advising for the protection of data, information, technology, methods, and assets associated with the system throughout its lifecycle.

A

Systems Security Engineer Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

The engineering effort includes such activities as concept exploration, analysis of alternatives, and preliminary or applied research to refine the concepts and/or feasibility of technologies employed.

A

New Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Engineering effort that is initiated during the concept and development stages of the system life cycle.

A

New Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The engineering effort occurs in response to adversity in the form of disruptions, hazards, and threats such as cyber-attacks, incidents, errors, accidents, faults, component failures, and natural disasters that diminish or prevent the system form achieving its design intent.

A

Reactive Modifications to Fielded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Engineering effort that can occur during the production, utilization, or support stages of the system life cycle and may be performed concurrently with or independent of da-to-day operations.

A

Reactive Modifications to Fielded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

The engineering effort may enhance an existing capability, provide a new capability, or constitute a technology refresh of an existing capability.

A

Planned Upgrades to Fielded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Engineering effort occurs during the production, utilization, and support stages of the system life cycle and is performed while sustaining day-to-day operations.

A

Planned Upgrades to Fielded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

The engineering effort that is carried out as if developing a new system with a system life cycle that is distinct from the life cycle of a fielded system.

A

Planned Upgrades to Fielded Systems that Result in New Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Engineering effort that is performed in a development environment that is independent of the fielded system.

A

Planned Upgrades to Fielded Systems that Result in New Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

The engineering effort delivers a system that satisfies a security-dedicated need or provides a security-oriented purpose, and does so as a stand-alone system that may monitor or interact with other systems.

A

Security-dedicated or Security-purposed Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

The engineering effort delivers a system that satisfies the need for real-time control of vehicles, industrial or utility processes, weapons, nuclear, or other special-purpose needs.

A

Dedicated or Special Purpose Systems (High Confidence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

The engineering effort occurs across a set of constituent systems, each system with its own stakeholders, primary purpose, and planned evolution.

A

Systems of Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

The engineering effort involves migrating or adapting a system or system implementation from one operational environment or set of operating conditions to another operational environment or set of operating conditions.

A

Evolution of Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

The engineering effort removes system functions or services and associated system elements from operation, to include removal of the entire system, and may also include the transition of system functions and services to some other system.

A

Retirement of Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Engineering effort that occurs during the retirement stage of the system life cycle and may be carried out while sustaining day-to-day operations.

A

Retirement of Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Combination of interacting elements organized to achieve one or more stated purposes.

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Member of a set of elements that constitute a system.

A

System Element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

System whose life cycle is under consideration in the context of this International Standard.

A

System-of-interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

System that supports a system-of-interest during its life cycle stages but does not necessarily contribute directly to its function during operation.

A

Enabling System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

System that interacts with the system-of-interest in its operational environment.

A

Other System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Focus of the engineering effort.

A

System-of-interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Achieved only through sound, purposeful engineering informed by the specialty discipline of systems security engineering.

A

Adequate Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Made explicit by ‘binding’ together the following: (i) defining asset loss and consequences as the primary target of security, (ii) establishing security as a protection control objective for the system, and (iii) recognizing that the achievement of the protection control objective is a system design problem that delivers trustworthy system function across all system elements.

A

Adequate Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Results from the reasoned sum of all system protections (both active and passive protections) for all system execution modes (e.g., initialization, operation, maintenance, training, shutdown); for all system states (e.g., secure, nonsecure, normal, degraded, recovery); and for all transitions that occur between system states and between system execution modes.

A

Adequate Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

The security functions of the system that exhibit security protection behavior and therefore, have functional and performance attributes.

A

Active Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Security functions that explicitly satisfy security requirements that address the behavior, utilization, and interaction of and among technology/machine, environment, human, and physical system elements.

A

Active Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

The environment for the execution and construction of all security functions (both active protection and general system functionality).

A

Passive Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Includes architecture, design, and the rules that govern behavior, interaction, and utilization.

A

Passive Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Can be achieved by defining clear security objectives and requirements.

A

Documenting Adequate Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Often impacts performance or drives up the cost of hardware.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Must understand the sensitivity of the data, technology, and assets that interact or are a part of the system being designed.

A

Systems Security Engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Must identify the sensitivity and proved recommendations to the team on how to protect the data while stored, processed, or transmitted.

A

Systems Security Engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Space where the SSE: (i) defines security objectives, (ii) defines security requirements, (iii) defines success measurements, (iv) defines lifecycle security concepts, and (v) produces evidence for security aspects of the problem.

A

Problem Context Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Space where the SSE: (i) defines the security aspects, (ii) realizes the security aspects of the lifecycle security concepts, and (iii) produces evidence for security aspects of the solution.

A

Solution Context Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Space where the SSE: (i) develops the assurance case for acceptable security and (ii) demonstrates the assurance case is satisfied.

A

Trustworthiness Context Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Encompasses the acquisition and supply process.

A

Agreement Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Encompasses lifecycle model, infrastructure, portfolio, human resource, quality, and knowledge management.

A

Organizational Project Enabling Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Encompasses project planning, project assessment and control, decision management, risk management, configuration management, information management, measurement, and quality assurance.

A

Technical Management Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Encompasses business/mission analysis, stakeholder needs/requirements definition, system requirements definition, architectural definition, design definition, system analysis, implementation, integration, verification, transition, validation, operation, maintenance, and disposal.

A

Technical Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Includes concept, development, production, utilization, support, and retirement.

A

Lifecycle Stages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Includes agreement, organizational project-enabling, technical management, and technical processes.

A

System Lifecycle Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

States that a system should have simple, well-defined interfaces and functions that provide a consistent and intuitive view of data and how it is managed.

A

Principle of Clear Abstractions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

The elegance (e.g., clarity, simplicity, necessity, sufficiency) of the systems interfaces, combined with a precise definition of their functional behavior promotes ease of analysis, inspection, and testing as well as the correct and secure use of the system.

A

Principle of Clear Abstractions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Examples reflecting application of this include: (i) avoidance of redundant, unused interfaces, (ii) information hiding, and (iii) avoidance of semantic overloading of interfaces or their parameters (e.g., not using one function to provide different functionality, depending on how it is used).

A

Principle of Clear Abstractions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

A design discipline to ensure that the internal representation of information in one system component is not visible to another system component invoking or calling the first component, such that the published abstraction is not influenced by how the data may be managed internally.

A

Information Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Serves to isolate functions and related data structures into well-defined logical units.

A

Modularity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Allows the relationships of well-defined logical units to be better understood, so that dependencies are clear and undesired complexity can be avoided.

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Includes the following: (i) allocation of policies to systems in a network, (ii) allocation of system policies to layers, (iii) separation of system applications into processes with distinct address spaces, and (iv) separation of processes into subjects with distinct privileges based on hardware-supported privilege domains.

A

Security-informed Modular Decomposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Provide clarity and make it possible to understand the structure of a system.

A

Modularity and Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Security architectures constructed through the application of multiple mechanisms to create a series of barriers to prevent, delay, or deter an attack by an adversary.

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

States that the calling, synchronization, and other dependencies in the system should be partially ordered (e.g., some layers being self-contained and not dependent on lower layers).

A

Partially Ordered Dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Often the predominant security function of secure systems.

A

Mediation of Access to System Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

States that policy-enforcement mechanisms utilize the least common mechanisms available when satisfying stakeholder requirements.

A

Principle of Efficiently Mediated Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

States that no computer resource should be shared between system components (e.g., subjects, processes, functions) unless it is absolutely necessary to do so.

A

Principle of Minimized Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

In order to protect user-domain resources from arbitrary active entities, no resource should be shared unless that sharing has been explicitly requested and granted.

A

Principle of Minimized Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Must be carefully designed to avoid performance and covert storage and timing-channel problems.

A

Internal Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

States that the system design should be as small and simple as possible.

A

Principle of Reduced Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Contributes to the ability of system developers to understand the correctness and completeness of system security functions and facilitates identification of potential vulnerabilities.

A

Principle of Reduced Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

States that a system should be developed to facilitate the maintenance of its security properties when there are changes to its functionality structure, interfaces, and interconnections (i.e., system architecture) or its functionality configuration (i.e., security policy enforcement).

A

Principle of Secure Evolvability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

The benefits of this principle include reduced vendor lifecycle costs; reduced cost of ownership; improved system security; more effective management of security risk; and less risk uncertainty.

A

Principle of Secure Evolvability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Facilitates maintenance, reduces downtime, and allows for new technology to be brought to the existing design without needing to replace the entire system.

A

Principle of Secure Evolvability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

States that a component must be trustworthy to at least a level commensurate with the security dependencies it supports (i.e., how much it is trusted to perform its security functions by other components).

A

Principle of Trusted Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

This principle enables the composition of components such that trustworthiness is not inadvertently diminished and where consequently the trues is not misplaced.

A

Principle of Trusted Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

This principle is particularly relevant when considering systems and components which there are complex chains of trust dependencies.

A

Principle of Trusted Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

This principle also applies to a compound component that consists of several subcomponents (e.g., a subsystem), which may have varying levels of trustworthiness.

A

Principle of Trusted Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

States that the security dependencies in a system will form a partial ordering if they preserve the principle of trusted components.

A

Principle of Hierarchical Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

The system takes on the trust level of its least trustworthy component.

A

Principle of Hierarchical Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

States that the degree of protection provided to a component must be commensurate with its trustworthiness.

A

Principle of Inverse Modification Threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

As the trust placed in a component increases, the protection against unauthorized modification of the component should also increase to the same degree.

A

Principle of Inverse Modification Threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

States that a component need not be protected from more trustworthy components.

A

Principle of Hierarchical Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

The most trusted component must protect itself from all other components.

A

Principle of Hierarchical Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

States that the system should not have extraneous trusted components.

A

Principle of Minimized Security Elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

To reduce cost and decrease the complexity of the security analysis, a system should contain as few trustworthy components as possible.

A

Principle of Minimized Security Elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

States that each component should be allocated sufficient privileges to accomplish its specific functions, but no more.

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Limits the scope of the component’s actions, which has two desirable effects: (i) the security impact of failure, corruption, or misuse of the component will have a minimized impact; and (ii) the security analysis of the component will be simplified.

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

The scope of a given module or component should include only those system elements that are necessary for its functionality, and that the modes (e.g., read, write) by which the elements are accessed should be minimal.

A

Internal Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

The construction of modules so that only the elements encapsulated by the module are directly operated upon by the functions within the module.

A

Internal Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

States that system designers should consider requiring multiple authorized entities to provide consent before a highly critical operation or access to highly sensitive data, information, or resources is allowed to proceed.

A

Principle of Predicate Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Design options include such a mechanism that require simultaneous action or a sequence of operations where each successive action is enabled by some prior action, but no single individual is able to enable more than one action.

A

Principle of Predicate Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

States that systems should minimize their reliance on other systems for their own trustworthiness.

A

Principle of Self-reliant Trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

A benefit to this principle is that the isolation of a system will make it less vulnerable to attack.

A

Principle of Self-reliant Trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

States that the composition of distributed components that enforce the same security policy should result in a system that enforces that policy at least as well as the individual components do.

A

Principle of Secure Distributed Composition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

States that when composing a system where there is a potential threat to communications between components (i.e., the interconnections between components), each communication channel must be trustworthy to a level commensurate with the security dependencies it supports (i.e., how much it is trusted by other components to perform its security functions).

A

Principle of Trusted Communication Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Achieved by a combination of restricting access to the communication channel (to help ensure an acceptable match in the trustworthiness of the endpoints involved in the communication) and employing end-to-end protections involved in the data transmitted over the communication channel (to help protect against interception and modification, and to further increase the overall assurance of proper end-to-end communication).

A

Principle of Trusted Communication Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Technical process whose purpose is to define the business or mission problem or opportunity, characterize the solution space, and determine potential solution classes that could address a problem or take advantage of an opportunity.

A

Business or Mission Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

The security aspects of the problem or opportunity space are deinfed

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

The security aspects of the solution space are characterized.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

The concerns, constraints, limitations, and other security considerations that can affect potential solutions are defined.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Preliminary concepts for the security aspects of system lifecycle concepts are defined.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Alternative solution classes that take into account security objectives, considerations, concerns, limitations, and constraints, are identified.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Candidate and preferred alternative solution classes are identified, analyzed, and selected to explicitly account for security objectives, considerations, concerns, limitations, and constraints.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Any enabling systems or services needed to achieve the security aspects of business or mission analysis are available.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Security-relevant traceability of the business or mission problems and opportunities and the preferred alternative solution classes are established.

A

Business or Mission Analysis Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Business or mission analysis activity that focuses on doing research to understand the mission as the systems security engineering stakeholder.

A

Prepare for the Security Aspects of Business Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Business or mission analysis activity that focuses on doing research to determine which solution best meets mission objectives.

A

Evaluate and Select Solution Classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Business or mission analysis activity that focuses on documenting the solution.

A

Manage the Security Aspects of Business or Mission Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Business or mission analysis activity that focuses on doing research to identify potential solution classes.

A

Characterize the Security Aspects of the Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Technical process whose purpose is to define the stakeholder requirements for a system that can provide the capabilities needed by users and other stakeholders in a defined environment.

A

Stakeholder Needs and Requirements Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

The security interest and concerns of stakeholders of the system are identified.

A

Stakeholder Needs and Requirements Definition Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Required security characteristics and security context for the secure use of capabilities for all system lifecycle concepts in all system lifecycle stages are defined.

A

Stakeholder Needs and Requirements Definition Outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

Stakeholder assets and assets classes are identified.

A

Stakeholder Needs and Requirements Definition Outcome

205
Q

Assest susceptibility to adversity and uncertianity is determined.

A

Stakeholder Needs and Requirements Definition Outcome

206
Q

Asset protection priorities and protection assurances are determined.

A

Stakeholder Needs and Requirements Definition Outcome

207
Q

Stakeholder protection needs are defined and prioritized.

A

Stakeholder Needs and Requirements Definition Outcome

208
Q

Security-driven and security-informed constraints on a system are identified.

A

Stakeholder Needs and Requirements Definition Outcome

209
Q

Security-oriented performance measures are defined.

A

Stakeholder Needs and Requirements Definition Outcome

210
Q

The security interest and concerns of stakeholders of the system are identified.

A

Stakeholder Needs and Requirements Outcome

211
Q

Stakeholder protection needs are transformed into stakeholder security requirements.

A

Stakeholder Needs and Requirements Definition Outcome

212
Q

Stakeholder agreement that their protection needs and expectations are adequately reflected in the security requirements is achieved.

A

Stakeholder Needs and Requirements Definition Outcome

213
Q

Any enabling systems or services needed to support the security aspects of stakeholder needs and requirements definition are available.

A

Stakeholder Needs and Requirements Definition Outcome

214
Q

Asset protection data associated with protection needs and stakeholder security requirements is recorded as part of the system requirements.

A

Stakeholder Needs and Requirements Definition Outcome

215
Q

Traceability of stakeholder security requirements, stakeholder protection needs, and asset protection data is established.

A

Stakeholder Needs and Requirements Definition Outcome

216
Q

Stakeholder needs and requirements definition activity that focuses on identification of all stakeholders throughout the entire business or mission lifecycle that have a security interest.

A

Prepare for Stakeholder Protection Needs and Security Requirements Definition

217
Q

Stakeholder needs and requirements definition activity that focuses on documenting and prioritizing assets.

A

Define Stakeholder Protection Needs

218
Q

Stakeholder needs and requirements definition activity that focuses on turning stakeholder, system, and trades perspective needs into security requirements and security policy.

A

Transform Stakeholder Protection Needs into Security Requirements

219
Q

Stakeholder needs and requirements definition activity that focuses on reviewing stakeholder requirements and resolving identified issues.

A

Analyze Stakeholder Security Requirements

220
Q

Technical process whose purpose is to generate system architecture alternatives, to select on or more alternatives that frame stakeholder concerns and meet system requirements, and to express this in a set of consistent views.

A

Architectural Definition

221
Q

Stakeholder security concerns are addressed by the system architecture.

A

Architectural Definition Outcome

222
Q

The concept of secure function for the system at the architecture level is defined.

A

Architectural Definition Outcome

223
Q

Security viewpoints, views, and models of the system architecture are developed.

A

Architectural Definition Outcome

224
Q

Security context, domains, boundaries, and external interfaces of the system are defined.

A

Architectural Definition Outcome

225
Q

Security concepts, properties, characteristics, functions, behavior, or constraints are allocated to architectural elements.

A

Architectural Definition Outcome

226
Q

Security-relevant system elements and their interfaces are identified.

A

Architectural Definition Outcome

227
Q

The security aspects of candidate system architectures are analyzed and assessed.

A

Architectural Definition Outcome

228
Q

Alignment of the architecture with the system security requirements and security design characteristics is achieved.

A

Architectural Definition Outcome

229
Q

Any enabling systems or services needed for the security aspects of the architectural definition are available.

A

Architectural Definition Outcome

230
Q

Traceability of architecture elements to stakeholder and system security requirements is established.

A

Architectural Definition Outcome

231
Q

Candidate security-related architecture metrics are identified.

A

Architectural Definition Outcome

232
Q

Architecture definition activity that focuses on identifying what impacts the security aspects of the system architecture and stakeholder concerns.

A

Prepare for Architectural Definition from the Security Standpoint

233
Q

Architecture definition activity that focuses on gathering relevant documentation and identifying key drivers that may impact the architecture.

A

Develop Security Viewpoints of the Architecture

234
Q

Architecture definition activity that focuses on visualizing the security concepts and functionality important to stakeholders and where they are within the architecture.

A

Develop Security Models and Security Aspects of Candidate Architectures

235
Q

Architecture definition activity that focuses on combining of system architecture from other stakeholders with the security architecture.

A

Related Security Views of the Architecture to the Design

236
Q

Architecture definition activity that focuses on assessing candidate architectures and deciding on one to establish as the baseline architecture.

A

Select Candidate Architecture

237
Q

Architecture definition activity that focuses on identifying the architectural governance approach and includes documenting applicable processes or laws, and who must approve the architecture.

A

Manage the Security View of the Selected Architecture

238
Q

Technical process whose purpose is to provide sufficient detailed data and information about the system and its elements to enable the implementation consistent with architectural entities as defined in models and views of the system architecture.

A

Design Definition

239
Q

Security design characteristics of each system element are defined.

A

Design Definition Outcome

240
Q

System security requirements are allocated to system elements.

A

Design Definition Outcome

241
Q

Design enablers necessary for the security aspects of design definition are selected or defined.

A

Design Definition Outcome

242
Q

Security interfaces and security aspects of interfaces between system elements composing the system are defined or refined.

A

Design Definition Outcome

243
Q

Security-driven design alternatives for system elements are assessed.

A

Design Definition Outcome

244
Q

Design artifacts that include security considerations and constraints are developed.

A

Design Definition Outcome

245
Q

Any enabling systems or services needed for the security aspects of design definition are available.

A

Design Definition Outcome

246
Q

Traceability of security design characteristics to the architectureal entities of the system architecture is established.

A

Design Definition Outcome

247
Q

Candidate security-related design metrics are identified.

A

Design Definition Outcome

248
Q

Design definition activity that focuses on determining what secure functions will take place where and which security technology is required for each system element.

A

Prepare for Security Design Definition

249
Q

Design definition activity that focuses on transforming security architecture elements into security design characteristics.

A

Establish Security Design Characteristics and Enablers for Each System Element

250
Q

Design definition activity that focuses on identifying and assessing non-developmental items (NDI).

A

Asses the Alternatives for Obtaining Security-relevant System Elements

251
Q

Components that already exist that can be incorporated into the design to fulfill a security function or capability (e.g., COTS).

A

Non-developmental Items

252
Q

Technical process whose purpose is to provide a rigorous basis of data and information for technical understanding to aid decision making across the life cycle.

A

System Analysis

253
Q

The security aspects of system analysis needs are identified.

A

System Analysis Outcomes

254
Q

Assumptions and results related to the security aspects of system analysis are identified and validated.

A

System Analysis Outcomes

255
Q

System security analysis results are provided for decisions.

A

System Analysis Outcomes

256
Q

Any enabling systems or services needed for the security aspects of syste analysis are available.

A

System Analysis Outcomes

257
Q

Traceability of system security analysis results is established.

A

System Analysis Outcomes

258
Q

System analysis activity that focuses on the preparation for a system design review by pulling together all the artifacts relevant to the design to justify the design decisions made thus far.

A

Prepare for the Security Aspects of System Analysis

259
Q

System analysis activity that focuses on analysis for quality and validity, reviewing and validating the assumptions associated with the security design.

A

Perform the Security Aspects of System Analysis

260
Q

System analysis activity that focuses on checking the documentation to make sure the traceability of the security design aspects and the outputs of the analysis are recorded.

A

Manage the Security Aspects of System Analysis.

261
Q

System analysis activity during which a formal design review would take place.

A

Perform the Security Aspects of System Analysis

262
Q

Technical process whose purpose is to realize a specified system element.

A

Implementation

263
Q

The security aspects of the implementation strategy are developed.

A

Implementation Outcome

264
Q

The security aspects of implementation that constrain the requirements, architecture, or design are identified.

A

Implementation Outcome

265
Q

A security-relevant or security-informed system element is realized.

A

Implementation Outcome

266
Q

System elemetns are securely packaged and stored.

A

Implementation Outcome

267
Q

Any enabling systems or services needed for the security aspects of implementation are available.

A

Implementation Outcome

268
Q

Traceability of the security aspects of the implemented system elements is established.

A

Implementation Outcome

269
Q

Implementation activity that focuses on documenting the implementation strategy and sharing it with stakeholders with an emphasis on design constraints from security aspects.

A

Prepare for the Security Aspects of Implementation

270
Q

Implementation activity that focuses on refining implementation procedures and developing training materials for users.

A

Perform the Security Aspects Implementation

271
Q

Implementation activity that focuses on documenting the results of the implementation and any issues that are encountered, including the security aspects implemented on a particular element.

A

Manage the Results of the Security Aspects Implementation

272
Q

Technical process whose purpose is to synthesize a set of system elements into a realized system (product or service) that satisfies system requirements, architecture, and design.

A

Integration

273
Q

The security aspects of the integration strategy are developed.

A

Integration Outcome

274
Q

The security-driven integration constraints that influence requirements, architecture, design, orinterfaces and interactions are identified.

A

Integration Outcome

275
Q

An approach and checkpoints for the correct secure operation of the assembled interfaces, interactions, behavior, and system functions are developed.

A

Integration Outcome

276
Q

Any enabling systems or services needed to achieve the security aspects of integration are available.

A

Integration Outcome

277
Q

A trustworthy secure system composed of implemented system elements is integrated.

A

Integration Outcome

278
Q

The security behavior and interactions between interfaces of implemented system elements are checked.

A

Integration Outcome

279
Q

The security behavior and interactions between the system and the external environment are checked.

A

Integration Outcome

280
Q

The security aspects of integration results and security anomalies are identified.

A

Integration Outcome

281
Q

Traceability of the security aspects of the integrated system elements is established.

A

Integration Outcome

282
Q

Integration activity that focuses on developing the integration strategy and identifying any constraints resulting from integration.

A

Prepare for the Security Aspects of Integration

283
Q

Integration activity that focuses on obtaining securely configured system elements and assembling them into the system.

A

Perform the Security Aspects of Integration

284
Q

Integration activity that focuses on recording security aspects and anomalies discovered during integration and documenting security-relevant data as a security artifact.

A

Manage Results of the Seucrity Aspects of Integration

285
Q

Technical process whose purpose is to provide objective evidence that a system or system element fulfills its specified requirements and characteristics.

A

Verification

286
Q

The security aspects of the verification strategy are developed.

A

Verification Outcome

287
Q

The security aspects of verification that constrain system requirements, architecture, or design are identified.

A

Verification Outcome

288
Q

Any enabling systems or services needed to achieve the security aspects of verification are available.

A

Verification Outcome

289
Q

The security requirements and security characteristics of the system or system element are verified.

A

Verification Outcome

290
Q

Security-driven data providing information for corrective actions is reported.

A

Verification Outcome

291
Q

Evidence that the realized system satisfies the system security requirements, security views of the architecture, and security design is provided.

A

Verification Outcome

292
Q

The security aspects of verification results and security anomalies are identified.

A

Verification Outcome

293
Q

Traceability of the security aspects of the verified system elements is established.

A

Verification Outcome

294
Q

Verification activity that focuses on identifying the scope and strategy of the verification effort.

A

Prepare for the Security Aspects of Verification

295
Q

A type of assessment method that is characterized by the
process of checking, inspecting, reviewing, observing, studying,
or analyzing one or more assessment objects to facilitate
understanding, achieve clarification, or obtain evidence, the results of which are used to support the determination of
security control or privacy control effectiveness over time.

A

Examine

296
Q

A type of assessment method that is characterized by the
process of conducting discussions with individuals or groups within an organization to facilitate understanding, achieve
clarification, or lead to the location of evidence, the results of which are used to support the determination of security control and privacy control effectiveness over time.

A

Interview

297
Q

A type of assessment method that is characterized by the
process of exercising one or more assessment objects under
specified conditions to compare actual with expected behavior,
the results of which are used to support the determination of
security control or privacy control effectiveness over time.

A

Test

298
Q

Verification activity that focuses on developing and performing the test procedures for verification of the security aspects of the design.

A

Perform Security-focused Verification

299
Q

Verification activity that focuses on recording the results and anomalies found during verification.

A

Manage Results of Security-focused Verification

300
Q

Technical process whose purpose is to establish a capability for a system to provide services specified by stakeholder requirements in the operational environment.

A

Transition

301
Q

The security aspects of the transition strategy are developed.

A

Transition Outcome

302
Q

The security aspects of transition that constrain system requirements, architecture, or design are identified.

A

Transition Outcome

303
Q

Any enabling systems or services needed to achieve the security aspects of transition are available.

A

Transition Outcome

304
Q

The preparation of the operational site includes its security aspects.

A

Transition Outcome

305
Q

The system and its enabling systems are securely installed in their operational environment and are capable of delivering the specified security functions and exhibiting secure behavior and characteristics.

A

Transition Outcome

306
Q

Individuals involved with the operation, sustainment, and support of the system are trained in the system security capabilities and limitations.

A

Transition Outcome

307
Q

Security-relevant transition results and anomalies are identified.

A

Transition Outcome

308
Q

The installed system is activated and ready for operation in consideration of security-relevant capability, constraints, limitations, and identified anomalies.

A

Transition Outcome

309
Q

Traceability of the security aspects of the transitioned elements is established.

A

Transition Outcome

310
Q

Transition activity that focuses on developing the transition strategy and identifying the site, constraints, and training relevant to the transition.

A

Prepare of the security Aspects of Transition

311
Q

Transition activity that focuses on delivering the system for installation, providing security training, and demonstrating that system and security functions meet requirements.

A

Perform the Security Aspects of Transition

312
Q

Transition activity that focuses on recording anomalies, security aspects, operational incidents, and problems.

A

Manage Results of the Security Aspects of Transition

313
Q

Technical process whose purpose is to provide objective evidence that the system, when in use, fulfills its business or mission objectives and stakeholder requirements, achieving its intended use in its intended operational environment.

A

Validation

314
Q

The security aspects of the validation strategy are developed.

A

Validation Outcome

315
Q

Validation criteria for stakeholder security requirements are defined.

A

Validation Outcome

316
Q

The availability of security services required by stakeholders is confirmed.

A

Validation Outcome

317
Q

The security aspects of validation that constrain requirements, architecture, or design are identified.

A

Validation Outcome

318
Q

The security aspects of the system or system element are validated.

A

Validation Outcome

319
Q

Any enabling systems or services needed to achieve the security aspects of validation are available.

A

Validation Outcome

320
Q

Security-focused validation results and security anomalies are identified.

A

Validation Outcome

321
Q

Evidence that the realized system or system elements satisfies stakeholder protection needs is provided.

A

Validation Outcome

322
Q

Traceability of the validated security-relevant system elements is established.

A

Validation Outcome

323
Q

Validation activity that focuses on developing the scope and strategy of validation actions.

A

Prepare for the Security Aspects of Validation

324
Q

Validation activity that focuses on developing and performing procedures.

A

Perform the Security Aspects of Validation

325
Q

Validation activity that focuses on recording security aspects and security anomalies into the formal body of evidence.

A

Manage Results of the Security Aspects for Validation

326
Q

Techincal process whose purpose is to use the system to deliver its services.

A

Operation

327
Q

The security aspects of the operation strategy are developed.

A

Operation Outcome

328
Q

The security aspects of operation that constrain system requirements, architecture, or design are identified.

A

Operation Outcome

329
Q

Any enabling systems or services needed to support the secure operation of the system are available.

A

Operation Outcome

330
Q

Trained and qualified personnel capable of securely operating the system are available.

A

Operation Outcome

331
Q

System services that meet stakeholder security requirements are delivered.

A

Operation Outcome

332
Q

The security aspects of system performance during operation are monitored.

A

Operation Outcome

333
Q

Traceability of the security aspects of operations elements is established.

A

Operation Outcome

334
Q

Security support to the customer is provided.

A

Operation Outcome

335
Q

Operation activity that focuses on developing the scope and strategy of operation actions.

A

Perpare for Secure Operation

336
Q

Operation activity that focuses on the secure use of the system as intended in the intended environment.

A

Perform Secure Operation

337
Q

Operation activity that focuses on recording the results and incidents.

A

Manage Results of Secure Operation

338
Q

Operation activity that focuses on documenting customer requests for support and providing assistance to customers.

A

Support Security Needs of Customers

339
Q

Technical Process whose purpose is to sustain the capability of the system to provide a service.

A

Maintenace

340
Q

The security aspects of the maintenance strategy are developed.

A

Maintenace Outcome

341
Q

The security aspects of maintenance and logistics that constrain system requirements, architecture, or design are identified.

A

Maintenace Outcome

342
Q

Any enabling systems or services needed to support the security aspects of system maintenance and logistics are available.

A

Maintenace Outcome

343
Q

Replacement, repaired, or modified system elements are available in consideration of their security aspects.

A

Maintenace Outcome

344
Q

The need for changes to address security-relevant corrective, perfective, or adaptive maintenance is reported.

A

Maintenace Outcome

345
Q

Security-relevant aspects, failure, and lifetime data, including associated costs, are determined.

A

Maintenace Outcome

346
Q

Traceability of the security aspects of the maintained elements is established.

A

Maintenace Outcome

347
Q

Maintenance activity that focuses on defining the maintenance strategy and identifying system constraints and trade spaces.

A

Prepare for the Security Aspects of Maintenance

348
Q

Maintenance activity that focuses on reviewing incident and problem reports and implementing system restoration actions or preventative maintenance.

A

Perform the Security Aspects of Maintenance

349
Q

Maintenance activity that focuses on acquisition and operational logistics.

A

Perform the Security Aspects of Logistics Support

350
Q

Maintenance activity that focuses on recording security aspects and incidents encountered while performing maintenance and logistics.

A

Manage Results of the Seucrity Aspects of Mainteance and Logistics

351
Q

Technical process whose purpose is to end the existence of a system element or system for a specified intended use, appropriately handle replaced or retired elements, and to properly attend to identified critical disposal needs (e.g., per an agreement, per organizational policy, or for environment, legal, safety, security aspects).

A

Disposal

352
Q

The security aspects of the disposal strategy are developed.

A

Disposal Outcome

353
Q

The security aspects of disposal that constrain system requirements, architecture, or design are identified.

A

Disposal Outcome

354
Q

Any enabling systems or services needed to support the security aspects of disposal are available.

A

Disposal Outcome

355
Q

System elements are securely removed from service, destroyed, stored, reclaimed, or recycled.

A

Disposal Outcome

356
Q

The environment is returned to its original secure or agreed-upon secure state.

A

Disposal Outcome

357
Q

Records of secure disposal actions and analysis are available.

A

Disposal Outcome

358
Q

Disposal activity that focuses on developing the disposal strategy and identifying any required support services or secure storage.

A

Prepare for the Security Aspects of Disposal

359
Q

Disposal activity that focuses on removing impacted systems, system elements, or operating staff.

A

Perform the Security Aspects of Disposal

360
Q

Disposal activity that focuses on confirming that no unresolved factors exist and restoring the environment.

A

Manage Results of the Security Aspects for Disposal

361
Q

The only organizational official that can accept the security and privacy risk to organizational operations, organizational assets, and individuals.

A

Authorization Official

362
Q

Provides a set of well-defined rules that determines aspects of the behavior, interactions, and outcomes of system elements that are deemed secure.

A

Security Policy

363
Q

Is enforced individually and in combination by human, physical and automated system elements.

A

Security Policy

364
Q

Rules that govern access to, operations on, and disclosure of system elements.

A

Confidentiality

365
Q

Rules that govern the modification and destruction of system elements and that govern the manner in which system elements can be manipulated.

A

Integrity

366
Q

Rules that govern the presence, accessibility, readiness, and continuity of service of system elements.

A

Availability

367
Q

Include a statement of intent to protect identified assets within the specific scope of stakeholder responsibility and security loss and risk concerns.

A

Security Policy Objectives

368
Q

Identify the assets to be protected and scope of protection.

A

Security Policy Objectives

369
Q

The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes its assets to achieve specified security policy objectives.

A

Organizational Security Policy

370
Q

Specifies what a system with security policy enforcement responsibility is expected to do.

A

System Security Policy

371
Q

The set of restrictions and properties that to the enforcement of at specifies how a system enforces or contributes to the enforcement of an organizational security policy.

A

System Security Policy

372
Q

The use of open or public designs for system security that do not rely on secret or proprietary design elements.

A

Open Design Concept

373
Q

Advantages of this software design concept are low cost and customization.

A

Open Design Concept

374
Q

Involves the development of software for which the organization or other licensed entity is the sole owner.

A

Proprietary Design Concept

375
Q

Lifecycle model that describes each activity as a sequential top-down series of independent steps.

A

Waterfall/Predictive Model

376
Q

Lifecycle model commonly seen in the execution of large systems engineering projects and has a sequential progression from project definition, through implementation, and to project test and integration.

A

V Model

377
Q

Lifecycle model used to effectively manage disruptive technology and is focus on rapid and transparent feedback loops with the customer.

A

Agile/Iterative Model

378
Q

This simple model compares the uncertainty of requirements with the technical degree of uncertainty in a project.

A

Uncertainty and Complexity Model

379
Q

When tasks and activities to complete a project appear to have low uncertainty requirements in requirements definition and in technical uncertainty.

A

Simple Projects

380
Q

When tasks and activities to complete a project appear to have increased uncertainty requirements in requirements definition and in technical uncertainty.

A

Complex Projects

381
Q

When tasks and activities to complete a project appear to have high uncertainty requirements in requirements definition and in technical uncertainty.

A

Chaotic Projects

382
Q

Lifecycle that works well on projects where the requirements and technical delivery have low uncertainty.

A

Waterfall/Predictive Lifecycles

383
Q

Lifecycle that wors well on projects where the customer may not know exactly what they want for a finished product.

A

Iterative Lifecycles

384
Q

Lifecycle that provides finished deliverables that the customer can both review and use immediately; focus is on speed.

A

Incremental Lifecycles

385
Q

Lifecycle that is a combination of iterative and incremental lifecycle approaches; delivers highest value work first.

A

Agile Lifecycles

386
Q

Lifecycle that develops an initial capability is built out to meet current needs and future needs are projected and aligned strategically with future increments.

A

Incremental Lifecycles

387
Q

Agile team member that contributes to the entire set of skills necessary to produce a working product.

A

Cross-functional Team Member

388
Q

Agile team member that guides product design and delivery.

A

Product Owner

389
Q

Agile team member that manages the production of the working product.

A

Team Facailitator

390
Q

Chart that shows number of features completed, number of features remaining, and new features added to the project.

A

Agile Burndown Chart

391
Q

Easy to understand and provide a rigid clarity and clearly defined structure.

A

Waterfall Model Pros

392
Q

Difficult to manage under complexity, assumes all requirements can be defined in advance, and is difficult to insert new technology.

A

Waterfall Model Cons

393
Q

Easy to bring in new technology during prototype and proof-of-concept iterations, continuous customer feedback loops enable higher customer satisfaction, and wasteful development cycles are minimized.

A

Agile Model Pros

394
Q

Needs a disciplined and experienced product owner and products may be delivered without appropriate security measures.

A

Agile Model Cons

395
Q

This lifecycle has fixed requirements, activities are performed once, single products are delivered, and the goal is cost management.

A

Predictive Lifecycle

396
Q

This lifecycle has dynamic requirements, activates are repeated until customer expectations are met, single products are delivered, and the goal is correctness of the solution.

A

Iterative Lifeccle

397
Q

This lifecycle has dynamic requirements, activates are broken into smaller increments and performed once per increment, frequent small products are delivered, and the goal is speed.

A

Incremental Lifecycle

398
Q

This lifecycle has dynamic requirements, activates are repeated until customer expectations are met, frequent small products are delivered, and the goal is customer satisfaction and value.

A

Agile Lifecycle

399
Q

Document that contains the three key principles for SSE projects: (i) keep the problem and solution spaces separate, (ii) the problem space is defined by the customer’s mission or business needs, and (iii) the systems engineer and information systems security engineer define the solution space, drive by the problem space.

A

Information Assurance Technical Framework (IATF)

400
Q

This process has the following activities: (i) discover needs, (ii) define system requirements, (iii) define system architecture, (iv) develop detailed design, and (v) implement the system.

A

The Information Systems Security Engineering Process

401
Q

Technical management process whose purpose is to produce and coordinate effective and workable plans.

A

Project Planning

402
Q

Security objectives and the security aspects of project plans are defined.

A

Project Planning Outcome

403
Q

Systems security engineering roles, responsibilities, accountabilities, and authorities are defined.

A

Project Planning Outcome

404
Q

Resources and services necessary to achieve the security objectives of the project are formally requested and committed.

A

Project Planning Outcome

405
Q

Plans for the execution of the security aspects of the project are activated.

A

Project Planning Outcome

406
Q

Define the security aspects of the project.

A

Project Planning Activity

407
Q

Plan the security aspects of the project and technical management.

A

Project Planning Activity

408
Q

Activate the security aspects of the project.

A

Project Planning Activity

409
Q

Technical management process whose purpose is to assess if the plans are aligned and feasible; determine the status of the project, technical and process performance; and direct execution to help ensure that the performance is according to plans and schedule, within projected budgets, to satisfy technical objectives.

A

Project Assessment and Control

410
Q

The security aspects of performance measures or assessment results are available.

A

Project Assessment and Control Outcome

411
Q

The adequacy of security-relevant roles, responsibilities, accountabilities, and authorities is assessed.

A

Project Assessment and Control Outcome

412
Q

The adequacy of resources allocated to the security aspects of the project is assessed.

A

Project Assessment and Control Outcome

413
Q

The security aspects of technical progress reviews are performed.

A

Project Assessment and Control Outcome

414
Q

Deviations in the security aspects of project performance from plans are investigated and analyzed.

A

Project Assessment and Control Outcome

415
Q

Lessons learned are recorded to help inform and guide future projects and activities within projects.

A

Project Assessment and Control Outcome

416
Q

Affected stakeholders are informed of the security aspects of project status.

A

Project Assessment and Control Outcome

417
Q

Corrective action is defined and directed, when the security aspects of project achievement are not meeting targets.

A

Project Assessment and Control Outcome

418
Q

The security aspects of project replanning are initiated, as necessary.

A

Project Assessment and Control Outcome

419
Q

The security aspects of project action to progress (or not) from one scheduled milestone or event to the next is authorized.

A

Project Assessment and Control Outcome

420
Q

Project security objectives are achieved.

A

Project Assessment and Control Outcome

421
Q

Plan for the security aspects of project assessment and control.

A

Project Assessment and Control Activity

422
Q

Assess the security aspects of the project.

A

Project Assessment and Control Activity

423
Q

Control the security aspects of the project.

A

Project Assessment and Control Activity

424
Q

Technical management process whose purpose is to provide a structured, analytical framework for objectively identifying, characterizing, and evaluating a set of alternatives for a decision at any point in the lifecycle and select the most beneficial course of action.

A

Decision Management

425
Q

The most important systems security engineering decisions that must typically be made within the project.

A

Trade-space/Trade-off Decisions

426
Q

The security aspects of the decision management strategy are established.

A

Decision Management Outcome

427
Q

The security aspects of decisions requiring alternative analysis are identified.

A

Decision Management Outcome

428
Q

Security-based decisions requiring alternative analysis are identified.

A

Decision Management Outcome

429
Q

The security aspects of alternative courses of action are identified and evaluated.

A

Decision Management Outcome

430
Q

A preferred course of action informed by or driven by security considerations is selected.

A

Decision Management Outcome

431
Q

The security aspects of a resolution, of the decision rationale, and of the assumptions are identified.

A

Decision Management Outcome

432
Q

Prepare for decisions with security implications.

A

Decision Management Activity

433
Q

Analyze the security aspects of decision information.

A

Decision Management Activity

434
Q

Make and manage security decisions.

A

Decision Management Activity

435
Q

Technical management process whose purpose is to identify, analyze, treat, and monitor the risks continually.

A

Risk Management

436
Q

The security aspects of the risk management strategy are defined.

A

Risk Management Outcome

437
Q

Security risks are identified and analyzed.

A

Risk Management Outcome

438
Q

Security risk treatment options are identified, prioritized, and selected.

A

Risk Management Outcome

439
Q

Appropriate security risk treatment is implemented.

A

Risk Management Outcome

440
Q

Security risks are evaluated on an ongoing basis to assess changes in status and progress in security risk treatment.

A

Risk Management Outcome

441
Q

Security risks are recorded and maintained in the risk profile.

A

Risk Management Outcome

442
Q

Plan security risk management.

A

Risk Management Activity

443
Q

Manage the security aspects of the risk profile.

A

Risk Management Activity

444
Q

Analyze security risk.

A

Risk Management Activity

445
Q

Treat security risk.

A

Risk Management Activity

446
Q

Monitor security risk.

A

Risk Management Activity

447
Q

Technical management process whose purpose is to manage and control system elements and configurations over the life cycle.

A

Configuration Management

448
Q

The security aspects of the configuration management strategy are defined.

A

Configuration Management Outcome

449
Q

The security aspects of configuration items are identified and managed.

A

Configuration Management Outcome

450
Q

Security criteria are included in configuration baselines

A

Configuration Management Outcome

451
Q

Changes to items under configuration management are securely controlled.

A

Configuration Management Outcome

452
Q

Security aspects are included in configuration status information.

A

Configuration Management Outcome

453
Q

Completed configuration audits include security criteria.

A

Configuration Management Outcome

454
Q

The security aspects of system releases and deliveries are controlled and approved.

A

Configuration Management Outcome

455
Q

Plan for the security aspects of configuration management.

A

Configuration Management Activity

456
Q

Perform the security aspects of configuration identification.

A

Configuration Management Activity

457
Q

Perform security configuration change management.

A

Configuration Management Activity

458
Q

Perform security configuration status accounting.

A

Configuration Management Activity

459
Q

Perform security configuration evaluation.

A

Configuration Management Activity

460
Q

Perform the security aspects of release control.

A

Configuration Management Activity

461
Q

Technical management process whose purpose is to generate, obtain, confirm, transform, retain, retrieve, disseminate, and dispose of information to designated stakeholders.

A

Information Management

462
Q

Protections for information to be managed are identified.

A

Information Management Outcome

463
Q

Information representations are defined with consideration of security aspects.

A

Information Management Outcome

464
Q

Information is securely obtained, developed, transformed, stored, validated, presented, and disposed.

A

Information Management Outcome

465
Q

The security aspects of information status are identified.

A

Information Management Outcome

466
Q

Information is available to designated stakeholders in compliance with authorized access, use, and dissemination criteria.

A

Information Management Outcome

467
Q

Prepare for the security aspects of information management.

A

Information Management Activity

468
Q

Perform the security aspects of information management.

A

Information Management Activity

469
Q

Technical management process whose purpose is to collect, analyze, and report security-relevant data and information to support effective management and to demonstrate the quality of products, services, and processes.

A

Measurement

470
Q

Security-relevant information needs are identified.

A

Measurement Outcome

471
Q

An appropriate set of security measures, based on the security-relevant information needs, are identified or developed.

A

Measurement Outcome

472
Q

Required security-relevant data is collected, verified, and stored.

A

Measurement Outcome

473
Q

Security-relevant data is analyzed, and the results are interpreted.

A

Measurement Outcome

474
Q

Security-relevant information items provide information that support decisions.

A

Measurement Outcome

475
Q

Technical management process whose purpose is to help ensure the effective application of the organization’s Quality Management process to the project.

A

Quality Assurance

476
Q

The security aspects of the quality assurance strategy are established.

A

Quality Assurance Outcome

477
Q

The security aspects of the project quality assurance procedures are defined and implemented.

A

Quality Assurance Outcome

478
Q

Criteria and methods for the security aspects of quality assurance evaluations are defined.

A

Quality Assurance Outcome

479
Q

The evaluations of the products, services, and processes of the project are performed, consistent with security quality management policies, procedures, and requirements.

A

Quality Assurance Outcome

480
Q

Security results of evaluations are provided to relevant stakeholders.

A

Quality Assurance Outcome

481
Q

Security-relevant incidents are resolved.

A

Quality Assurance Outcome

482
Q

Prioritized security-relevant problems are treated.

A

Quality Assurance Outcome

483
Q

Prepare for security quality assurance.

A

Quality Assurance Activity

484
Q

Perform product or service security evaluations.

A

Quality Assurance Activity

485
Q

Perform process security evaluations.

A

Quality Assurance Activity

486
Q

Manage quality assurance security records and reports.

A

Quality Assurance Activity

487
Q

Treat security incidents and problems.

A

Quality Assurance Activity

488
Q

Security considerations are addressed by the acquisition strategy.

A

Acquisition Outcome

489
Q

A request for a supplier to provide a product or service includes security considerations.

A

Acquisition Outcome

490
Q

Security considerations are included in the criteria for selecting a supplier.

A

Acquisition Outcome

491
Q

An agreement that contains security considerations is established between the acquirer and the supplier.

A

Acquisition Outcome

492
Q

A product or service that complies with the security aspects of the agreement is accepted.

A

Acquisition Outcome

493
Q

The security obligations of the acquirer that were defined in the agreement are satisfied.

A

Acquisition Outcome

494
Q

Prepare security requirements for acquisition.

A

Acquisition Activity

495
Q

Participate in the selection process.

A

Acquisition Activity

496
Q

A decision-making activity used to identify the most acceptable solution among several potential solutions.

A

Trade-off Study

497
Q

Evaluates each proposed solution against schedule, performance, and cost in a weighted manner.

A

Trade-off Study

498
Q

Examples include: (i) the Pugh method, (ii) Analytic Hierarchy Process, and (iii) the Kepner Tregoe method.

A

Trade-off Study Methods

499
Q

Includes: (i) insertion of counterfeits, (ii) unauthorized production, (iii) tampering, (iv) theft, (v) insertion of malicious software and hardware, and (vi) poor manufacturing and development practices.

A

Supply Chain Risks

500
Q

Occurs at the intersection of security, integrity, resilience, and quality.

A

Supply Chain Risk

501
Q

SCRM pillar that is focused on ensuring that the ICT supply chain will provide required products and services under stress of failure.

A

Resilience

502
Q

SCRM pillar that is focused on reducing vulnerabilities that may limit the intended function of a component, lead to component failure, or provide opportunities for exploitation.

A

Quality

503
Q

SCRM pillar that provides the confidentiality, integrity, and availability of information that (A) describes the ICT supply chain or (B) traverses the ICT supply chain as well as the parties who participating in the ICT supply chain.

A

Security

504
Q

SCRM pillar that is focused on ensuring that the ICT products or services in the ICT supply chain are genuine, unaltered, and that the ICT products and services will perform according to acquirer specifications and without additional unwanted functionality.

A

Integrity

505
Q

Includes: (i) insertion of counterfeits, (ii) tampering, (iii) theft, and (iv) insertion of malicious software.

A

Adversarial Threats

506
Q

Includes: (i) natural disaster, (ii) poor quality products/services, and (iii) poor practices.

A

Non-adversarial Threats

507
Q

Includes: (i) weaknesses to the supply chain, (ii) weaknesses within entities in the supply chain, and (iii) dependencies.

A

External Vulnerabilities

508
Q

Includes: (i) informational systems and components, and (ii) organizational policy/processes.

A

Internal Vulnerabilities

509
Q

Probability of a threat exploiting a vulnerability.

A

Likelihood

510
Q

Degree of harm.

A

Impact