Unit 1 Notes
Unit 1 Notes
This book uses a number of terms and concepts that are essential to
any discussion of information security.
If you have taken a system analysis and design course, you may have been
exposed to a model consisting of a different number of phases. SDLC
models range from having three to twelve phases, all of which have been
mapped into the six presented here. The waterfall model pictured
illustrates that each phase begins with the results and information gained
from the previous phase. At the end of each phase comes a structured
review or reality check, during which the team determines if the project
should be continued, discontinued, outsourced, postponed, or returned to
an earlier phase depending on whether the project is proceeding as
expected and on the need for additional expertise, organizational
knowledge, or other resources. Once the system is implemented, it is
maintained (and modified) over the remainder of its operational life. Any
information systems implementation may have multiple iterations as the
cycle is repeated over time. Only by means of constant examination and
renewal any system, especially an information security program, perform
up to expectations in the constantly changing environment in which it is
placed. The following sections describe each phase of the traditional SDLC
Logical Design The logical design phase creates and develops the
blueprints for information security, and examines and implements key
policies that influence later decisions. Also at this stage, the team plans the
incident response actions to be taken in the event of partial or catastrophic
loss. The planning answers the following questions: Continuity planning:
How will business continue in the event of a loss? Incident response: What
steps are taken when an attack occurs? Disaster recovery: What must be
done to recover information and vital systems immediately after a
disastrous event? Next, a feasibility analysis determines whether or not the
project should be continued or be outsourced.