Page 2 - Estimating_Software
P. 2

[Fill in the title of

                                                                     the document]






               Estimating Software – Security




               Table of Contents




                  Introduction ................................................................................................................................................................... 3
                  CIA Triad of Information Security......................................................................................................................... 3
                  Access Control ............................................................................................................................................................... 3

                  Application Security ................................................................................................................................................... 4
                  Business Continuity and Disaster Recovery Planning .................................................................................. 5
                  Information Security Governance and Risk Management .......................................................................... 5

                  Regulations, Investigations and Compliance .................................................................................................... 5
                  Using Best Practice Frameworks To Win .......................................................................................................... 6

                  Conclusion ...................................................................................................................................................................... 6






























                                                                                                  Page | 2
   1   2   3   4   5   6   7