Page 2 - Estimating_Software
P. 2
[Fill in the title of
the document]
Estimating Software – Security
Table of Contents
Introduction ................................................................................................................................................................... 3
CIA Triad of Information Security......................................................................................................................... 3
Access Control ............................................................................................................................................................... 3
Application Security ................................................................................................................................................... 4
Business Continuity and Disaster Recovery Planning .................................................................................. 5
Information Security Governance and Risk Management .......................................................................... 5
Regulations, Investigations and Compliance .................................................................................................... 5
Using Best Practice Frameworks To Win .......................................................................................................... 6
Conclusion ...................................................................................................................................................................... 6
Page | 2