ISSEP Engineering Exam Questions And Accurate Answers
Discover Information Needs Tasks - Answer 1.1 Analyze organisation mission
1.2 Determine relationship and importance of information to mission
1.3 Identify legal and regulatory requirements
1.4 Identify classes of threats
1.5 Determine impacts
1.6 Identify security services
1.7 Document the information protection needs
1.8 Document security management roles and responsibilities
1.9 Identify design constraints
1.10 Assess information protection effectiveness
1.10.1 Provide / present documented information protection needs to the customer
1.10.2 Obtain concurrence from the customer in the information protection needs
1.11 Certify and Authorize support system
1.11.1 Identify Designated Approving Authority
1.11.2 Identify Certifying Authority
1.11.3 Identify Certification and Accreditation and Acquisition processes
1.11.4 Ensure accreditor and certifier concurrence in the information protection needs
Define System Security Requirements - Answer 2.1 Elaborate system security context
2.1.1 Define system boundaies and interfaces with SE
2.1.2 Document security allocations to target system and external systems
2.1.3 Identify data flows between the target system and external systems and the
protection needs associated with those flows
2.2 Elaborate security CONOPS
, 2.3 Elaborate system security requirements baseline
2.3.1 Define system security requirements
2.3.2 Define system security modes of operation
2.3.3 Define system security performance measures
2.4 Analyze design constraints
2.5 Evaluate effectiveness of information protection
2.5.1 Provide and present security context, security CONOPS, and system security
requirements to the customer
2.5.2 Obtain customer concurrence in system security context, CONOPS, and
requirements
2.6 Provide support to system C&A
2.6.1 Ensure accreditor and certifier concurrence in system security context CONOPS
and requirements
Design System Security Architecture - Solution 3.1 Conduct functional analysis and
allocation
3.1.1 Analyze candidate systems architectures
3.1.2 Allocate security services to architecture
3.1.3 Select mechanism types
3.1.4 Submit security architectures for evaluation
3.1.5 Revise security architectures
3.1.6 Select secuirty architecture
3.2 Evaluate informatin protection effectiveness
3.2.1 Ensure selected security mechanisms provde the necessary security services
3.2.2 Brief the customer how the security architecture satisfies security requirements
3.2.3 Generate risk projection
3.2.4 Get concurrence from the customer in the security architecutre
3.3 Support System C&A
3.3.1 Prepare and submit final architecture documentation for risk analysis
3.3.2 Coordinate results of the risk analysis with accreditor and certifier
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.