WGU C725 Information Security and Assurance SET II | 100 Questions with 100% Correct Answers | Verified | Latest Update | 26 Pages
After determining the potential attack concepts, the next step in threat modeling is to perform ______________ analysis. ______________ analysis is also known as decomposing the application, system, or environment. The purpose of this task is to gain a greater understanding of the logic of the product as well as its interactions with external elements.Also known as decomposing the application - Reduction analysis Whether an application, a system, or an entire environment, it needs to be divided into smaller containers or compartments. Those might be subroutines, modules, or objects if you're focusing on software, computers, or operating systems; they might be protocols if you're focusing on systems or networks; or they might be departments, tasks, and networks if you're focusing on an entire business infrastructure. Each identified sub-element should be evaluated in order to understand inputs, processing, security, data management, storage, and outputs. Trust Boundaries, Data Flow Paths, Input Points, Privileged Operations, Details about Security Stance and Approach - The Five Key Concepts in the Decomposition process. In the decomposition process, any location where the level of trust or security changes. - Trust Boundaries
Schule, Studium & Fach
- Hochschule
-
Western Governors University
- Kurs
-
WGU C725
Dokument Information
- Hochgeladen auf
- 18. juni 2023
- Anzahl der Seiten
- 26
- geschrieben in
- 2022/2023
- Typ
- Prüfung
- Enthält
- Fragen & Antworten
Themen
-
wgu c725 information security and assurance set ii
Ebenfalls erhältlich im paket-deal