info2

Part 1: Create a list of concerns a security professional needs to ask/address in each of the eight steps of the System Life Cycle.

Part 2:  Research tools and resources available for supporting these processes.

Leave a Reply

Your email address will not be published. Required fields are marked *