首页> 外文会议>56th annual ISA POWID symposium >Developing Security Requirements Without Developing an Ulcer
【24h】

Developing Security Requirements Without Developing an Ulcer

机译:在不发展溃疡的情况下制定安全要求

获取原文
获取原文并翻译 | 示例

摘要

For over 15 years the author has worked as a consultant in the field of cyber security. Much of thatrntime has involved responding to RFIs, RFQs and RFPs with varying amounts of rigor when it comes tornthe requirements presented to responding vendors. And in most cases, the requirements have beenrnconfusing, inappropriate, or even counterproductive from the perspective of actually accomplishingrnsecurity.rnAnd then, one day, the author had to come up with requirements himself...and it all made sense. Hernrealized why requirements he had seen were typically so far off the mark, and suddenly had insightrninto the whole situation from end to end. The purpose of this paper is to delineate some of the causesrnfor this and to offer helpful alternative approaches and methods towards the creation of appropriatelyrndetailed security requirements, so that those in the audience who have to come up with requirementsrnwill understand how they are consumed, and get some insight into the way that requirements arernconsumed as a source of guidance.
机译:在过去的15年中,作者一直担任网络安全领域的顾问。大部分时间都涉及到对RFI,RFQ和RFP的响应,而对提交给响应供应商的要求的要求却不尽相同。从实际实现安全性的角度来看,在大多数情况下,这些要求变得令人困惑,不合适,甚至适得其反。然后,有一天,作者不得不自己提出要求……这一切都是有道理的。 Hern意识到为什么他所看到的需求通常都远远超出了预期,突然间从头到尾全面了解了整个情况。本文的目的是描述造成这种情况的一些原因,并提供有用的替代方法和方法来创建适当的详细安全需求,以便那些必须提出需求的受众将了解如何使用它们并获得对将需求作为指导来源消耗方式的一些见解。

著录项

  • 来源
  • 会议地点 OrlandoFL(US)
  • 作者

    Rob Shein;

  • 作者单位

    Cyber Security Lead, Black Veatch;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号