A study on Security Level Management Model Description
|
|
|
- Brianna Hortense King
- 9 years ago
- Views:
Transcription
1 A study on Security Level Management Model Description Tai-Hoon Kim Dept. of Multimedia, Hannam University, Daejeon, Korea Kouichi Sakurai Dept. of Computer Science & Communication Engineering, Kyushu University, Japan Abstract Security level decision is a basic activity for developing and managing of safe information systems, and core factor which can affect the investment for security countermeasures. According to the security level of IS, where and how the security countermeasures are implemented, which security policies are selected, and who will manage them are able to be decided. But more important thing than level decision is the management of level decided. And in this model, we proposed a new model to manage security level of IS. 1. SLMM Architecture Description SLM 2 or SLMM (Security Level Management Model) is a compilation of some engineering theories related to security. To understand this model, some backgrounds in security engineering and software engineering are required. The SLMM architecture is designed to provide a guide to keep the security level of information system. The goal of the architecture is to provide characteristics of the security countermeasures should be implemented to keep information system. And the goal of this architecture is to clearly separate basic characteristics from its institutionalization characteristics. In order to ensure this separation, the model has two dimensions, called area and level. Importantly, the SLMM does not imply that any particular group or role within an organization must do any of the security practices described in the model. Nor does it require that the latest and greatest security related technique or methodology be used. The model does require, however, that an organization have a policy that includes the basic security practices described in the model. The organization is free to create their own policy and organizational structure in any way that meets their business objectives. In this paper, we proposed SLMM to manage security level of IS efficiently and effectively. 2. The Basic Model The SLMM has two dimensions, area" and level. The area dimension is perhaps the easier of the two dimensions to understand. This dimension simply consists of all the practices that can construct security 87
2 countermeasure. These practices are called security practices, and can be categorized into 8 security areas in 2 parts. The structure and content of these security practices are discussed below. The level dimension represents some level features as they apply across a wide range of security areas. The level features represent activities that should be checked and confirmed as a part of implementing security practices. Each level feature contains some level practices. Figure 1 illustrates the relationship between security practices and level requirements. This figure represents similar concept with SSE-CMM but not same. The biggest difference is that SSE-CMM has the only continuous model but SLMM has not only continuous model but also staged model. In other words, security management part is continuous style, but security technology part is staged style. Putting the security practice and level requirements together provides security requirements should be implemented to keep an organization s security level. Level Dimension (Level Requirements) Level Requirement 1 Level Requirement 2 Area Dimension (Security Practices) Fig.1 Relationship between security practices and level requirements After deciding security level, some practices should be selected by considering characteristics and environments of information systems. Implementing all the requirements raised by combining all the security practices with all the level requirements will provide a good picture of the security countermeasures of the organization in question. 3. The security practices The SLMM contains 26 security practices, organized in 8 areas. These security practices cover all major areas of security countermeasures. Additionally, more security practices organized in additional areas can be appended, and these additional practices can be drawn from the other systems engineering or security engineering areas. 88
3 The security practices were gathered from a wide range of existing materials, practices, and expertises. The practices selected represent the best existing practice of the security community, but these practices are not static and can be modified by considering characteristics and environments of information system. Identifying security practices is complicated by the many different names for activities that are essentially the same. These activities occur anytime in the life cycle, at a different level of abstraction, or are typically performed by individuals in different roles. An organization cannot be considered to have achieved a security practice if it is only performed during the design phase or at a single level of abstraction. SLMM does not ignore these distinctions because these can be a candidate practice organizations can select. But SLMM does not contain these practices, so security level manager should decide if they want to include these practices. It is recommended that each security practice has some characteristics like as: Practice should be able to be applied across the lifecycle of the organization. Practice does not overlap with other practices. Practice represents a best practice of the security community. Practice does not simply reflect a state-of-the-art technique. Practice is applicable using multiple methods in multiple business contexts. Practice does not specify a particular method or tool. The security practices have been organized into security areas in a way that meets a broad spectrum of security organizations. There are many ways to divide the security domain into areas. Each security area has a set of goals that represent the expected state of an organization that is successfully implementing the security area. An organization that performs the security practices of the security area should also achieve its goals. It is recommended that each security area has some characteristics like as: Security area assembles related activities in one area for ease of use Security area relates to valuable security services Security area applies across the life cycle Security area includes all security practices that are required to meet the goals of the security area In SLMM, there are 8 security areas and these areas are grouped into 2 parts. The 8 security areas of the SLMM are listed below. Note that they are listed in alphabetical 89
4 order to discourage the notion that there the security areas are ordered by lifecycle phase. Part 1: Security Management Part (SMP) SA01 Human Resource SA02 Operation and Administration SA03 Physical Protection Part 2: Security Technology Part (STP) SA04 Access Control Technology SA05 Cryptography Technology SA06 Identification and Authentication Technology SA07 Service Assurance Technology SA08 Shielding Technology 4. The level requirements Level requirements are activities that apply to areas. They can address the management, measurement, and institutionalization aspects of each area. In general, they provide guide for security countermeasure and are used during an appraisal to determine if an organization keeps the guide well. Level requirements are grouped into logical areas called level features which are organized into four Security Levels which represent increasing organizational requirements. Unlike the security practices of the area dimension, the level features of the level dimension are ordered according to level, and contains process concept partially. Subsequent level features have level requirements that help to determine how well an organization manages and improves each security area as a whole. The level features below represent the attributes of level requirements to achieve each level, and each level feature contains some level requirements. And each security level contains two kinds of level features, one for security management part, and the other for security technology part. Security Level 1: Executed Basically 1.1 Security Practices in SMP are Performed Informally 1.2 Security Practices in STP are Installed and Managed Properly Security Level 2: Verified and Tracked 2.1 Security Practices in SMP are Verified and Tracked 90
5 2.2 Security Practices in STP are Installed and Managed Properly Security Level 3: Quantitatively Controlled 3.1 Security Practices in SMP are Measured and Controlled 3.2 Security Practices in STP are Installed and Managed Properly Security Level 4: Monitored and Improved 4.1 Security Practices in SMP are Monitored and Improved 4.2 Security Practices in STP are Installed and Managed Properly An organization is generally free to plan, track, define, control, and improve their security level in any way or sequence they choose. However, because some higher level requirements are dependent on lower level requirements, organizations are encouraged to work on the lower level requirements before attempting to achieve higher levels. 5. Security Practices Security level management is the activity to sustain the security level which defined as an essential one by considering operational environments of information systems [1-4]. So security level management is not the check of temporary status in short time but the continuous observation to the variable environment. To perform the security level management, all factors related to the operation of information system should be considered, and by doing so, security of whole information systems can be managed. But because of the limitation occurred by some reasons, all factors can not be managed by same level. To overcome this problem, selection of important factors should be done first Security Management Part In this paper, security areas in security management part are divided into 3 groups such as human resource, operation and administration, and physical protection. Part 1: Security Management Part (SMP) SA01 Human Resource SA02 Operation and Administration SA03 Physical Protection 5.2. Security Technology Part In this paper, security areas in security technology part are divided into 5 groups, such as access control, cryptography, identification and authentication, service assurance, and shielding. 91
6 Part 2: Security Technology Part (STP) SA04 Access Control Technology SA05 Cryptography Technology SA06 Identification and Authentication technology SA07 Service Assurance Technology SA08 Shielding Technology 6. Level Requirements This chapter contains the level requirements, that is, the requirements should be met to achieve each level, and these requirements can be grouped for SMP and STP. These level requirements are used in a area appraisal to determine the level of any security area. The level requirements are grouped according to level feature and security level. The level requirements are divided into the following security levels, each of which has several level features: Security Level 1 - Executed Basically Security Level 2 - Verified and Tracked Security Level 3 - Quantitatively Controlled Security Level 4 - Monitored and Improved Each level is decomposed into a set of level features that consist of a set of level requirements. Level requirements are activities that apply to areas, and can address the management, measurement, and institutionalization aspects of each area. In general, level requirements provide guide for security countermeasure and are used during an appraisal to determine if an organization keeps the guide well. An organization is generally free to plan, track, define, control, and improve their security level in any way or sequence they choose. However, because some higher level requirements are dependent on lower level requirements, organizations are encouraged to work on the lower level requirements before attempting to achieve higher levels Requirement of Level 1 Executed Basically Security practices of the security area are basically performed. Work products of the security area testify to their performance. Individuals within the organization recognize that an action should be executed, and there is general agreement that this action is executed as and when required. This security level comprises the following level features: Level feature 1.1 Security Practices in SMP are Performed Informally Level feature 1.2 Security Practices in STP are Installed and Managed Properly 92
7 6.2. Requirement of Level 2 Verified and Tracked In security level 1, informal and basic performance of security practice is enough. But in security level 2, performance of the selected security practices should be verified and tracked according to specified procedures. Measurement is used to track the performance, thus enabling the organization to manage its activities based on actual performance. The primary distinction from Level 1, Executed Basically, is that the performance is planned, verified, and tracked. This security level comprises the following level features: 2.1 Security Practices in SMP are Verified and Tracked 2.2 Security Practices in STP are Installed and Managed Properly 6.3. Requirement of Level 3 Quantitatively Controlled In security level 2, it is enough that performance of the selected security practices are verified and tracked according to specified procedures. But in security level 3, performance of the selected security practices should be quantitatively controlled, according to process. By collecting and analyzing the evidences of performance, organization can get a quantitative understanding of security level and an improved ability to predict performance [5]. This security level comprises the following level features: 3.1 Security Practices in SMP are Measured and Controlled 3.2 Security Practices in STP are Installed and Managed Properly 6.4. Requirement of Level 4 Monitored and Improved In security level 3, it is enough that performance of the selected security practices are quantitatively controlled. But in security level 4, performance of the selected security practices should be monitored and improved continuously. Based on the business goals of the organization, quantitative performance goals for level effectiveness and efficiency are established. And continuous endeavor of improvement against these goals should be enabled by quantitative feedback. This security level comprises the following level features: 4.1 Security Practices in SMP are Monitored and Improved 4.2 Security Practices in STP are Installed and Managed Properly 7. Conclusion and Future Work The SLMM architecture is designed to provide a guide to keep the security level of information system. The goal of the architecture is to provide characteristics of the security countermeasures should be implemented to keep information system. But to apply this SLMM to information system, employees of organization should be educated to know basic principles of security engineering and software engineering first. 93
8 Because this is a very difficult pre-condition to meet, because all employees are very busy always. To avoid this problem, even though an organization forms a team to take full charge security level management, it is still important to make all team members have similar knowledge. In this paper, unfortunately, we could not propose the list of security practices and level requirements. But the list of core security practices and level requirements will be published in near future. 8. References [1] FIPS PUB 171, Key Management Using ANSI X9.17 [2] FIPS PUB 140-1, Security Requirements for Cryptographic Modules [3] [4] [5] [6] Jones, C.D., A.B. Smith, and E.F. Roberts, Book Title, Publisher, Location, Date. [7] [8] 94
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
Value equivalent. ECTS equivalent. Value
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation MSc in Web Intelligence For undergraduate programmes only Single honours Joint Major/minor 2. Final award
The Configuration Management process area involves the following:
CONFIGURATION MANAGEMENT A Support Process Area at Maturity Level 2 Purpose The purpose of is to establish and maintain the integrity of work products using configuration identification, configuration
Meet The Family. Payment Security Standards
Meet The Family Payment Security Standards Meet The Family Payment Security Standards Payment Processing Electronic payments are increasingly becoming part of our everyday lives. For most people, it can
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Fourth generation techniques (4GT)
Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some
Writing Reports BJECTIVES ONTENTS. By the end of this section you should be able to :
Writing Reports By the end of this section you should be able to : O BJECTIVES Understand the purposes of a report Plan a report Understand the structure of a report Collect information for your report
A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles
A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles MICHAL KÖKÖRČENÝ Department of Information Technologies Unicorn College V kapslovně 2767/2, Prague, 130 00
Job description Customer Care Team Leader (Engagement)
Job description Customer Care Team Leader (Engagement) Main purpose of job The Customer Care Team Leader will manage the day to day running of the internal Customer Care engagement team, ensuring it provides
Survey of ISO 9001 Implementation in Greek Software Companies
16-ICIT & 8-C&C: 11-13/7/12 in Sweden ST-2: ISO 9000 / 14001 / 50001, etc. Paper #: 2-3 P- 81 Survey of ISO 9001 Implementation in Greek Software Companies Theodore Amygdalas Computer Lab Assistant at
Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2
International Symposium on Social Science (ISSS 2015) Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2 1 College of Electronic and Control Engineering,
Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey
The Tools You Need. The Experience You Can Trust. WHITE PAPER Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey In today s tough economic climate, nonprofit organizations
Results Unlimited White Paper. Instructional Strategies for the Development of E-learning
White Paper Instructional Strategies for the Development of E-learning Introduction To support the development of large scale, custom E-learning, Results Unlimited has developed appropriate instructional
The 360 Degree Feedback Advantage
viapeople Insight - Whitepaper The 360 Degree Feedback Advantage How this powerful process can change your organization Karen N. Caruso, Ph.D. Amanda Seidler, Ph.D. The 360 Degree Feedback Advantage Champions
www.reactive360.com What is a 360 degree appraisal? A short introduction to the process. Contents: Introduction: page.2.
www.reactive360.com What is a 360 Document Version 1.01 Thursday, 16 August 2007 What is a 360 degree appraisal? A short introduction to the process. Contents: Introduction: page.2. How many people should
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Organizational Change: Managing the Human Side
Organizational Change: Managing the Human Side Based on findings from the American Productivity & Quality Center s 1997 Organizational Change consortium benchmarking study Changing Regulatory or Legal
3D Interactive Information Visualization: Guidelines from experience and analysis of applications
3D Interactive Information Visualization: Guidelines from experience and analysis of applications Richard Brath Visible Decisions Inc., 200 Front St. W. #2203, Toronto, Canada, [email protected] 1. EXPERT
Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected].
Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected] This tutorial
An Introduction to. Metrics. used during. Software Development
An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote
Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting
Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting [email protected] All rights reserved. You have permission to copy and distribute the document as long as you make no changes
Evaluation: Designs and Approaches
Evaluation: Designs and Approaches Publication Year: 2004 The choice of a design for an outcome evaluation is often influenced by the need to compromise between cost and certainty. Generally, the more
[project.headway] Integrating Project HEADWAY And CMMI
[project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper
Introduction to Systems Analysis and Design
Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.
An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs)
An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs) Rosziati Ibrahim, Siow Yen Yen Abstract System development life cycle (SDLC) is a process uses during the development of any
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
The Leadership Pipeline Ram Charan, Stephen Drotter, and James Noel
The Big Idea The Leadership Pipeline Ram Charan, Stephen Drotter, and James Noel There is a growing need to develop leaders within many corporations. The demand for leaders greatly outpaces the supply.
Module 3: The Project Planning Stage
Overview Once you've initiated the project and gathered all relevant information, you'll then begin planning your project. The planning stage depends on the size of your project, how much information you
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
ISO Revisions Whitepaper
ISO Revisions ISO Revisions Whitepaper What is the difference between a procedures and a process approach? Approaching change Process vs procedures: What does this mean? The concept of process management
Human Capital Advantage for Business What is the value of ADP ihcm for HR Directors?
Human Capital Advantage for Business What is the value of ADP ihcm for HR Directors? HR.Payroll.Benefits. ADP ihcm: Rethink Human Capital Management The need for HR to be a true business partner has never
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
The Systems Security Engineering Capability Maturity Model (SSE-CMM)
The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development [email protected] 410-309-1780 Topics Why define security engineering
Content Sheet 16-1: Introduction to Documents & Records
Content Sheet 16-1: Introduction to Documents & Records Role in quality management system The management of documents and records is one of the 12 essential elements of the quality system. The management
Writing for work documents
Writing for work documents Written communications in the work environment are often compiled using existing templates that guide you through most of the information that is required. Nonetheless, there
Analysis and Implementation of Workflowbased Supply Chain Management System
Analysis and Implementation of Workflowbased Supply Chain Management System Yan Tu 1 and Baowen Sun 2 1 Information School, Central University of Finance and Economics, Beijing, 100081, P.R.China,[email protected]
Practical Experience Requirements Initial Professional Development for Professional Accountants
International Accounting Education Standards Board AGENDA ITEM 2-3 Revised Draft of IEPS(Clean Version) Proposed International Education Practice Statement Practical Experience Requirements Initial Professional
Chapter 5: Logical Database Design and the Relational Model Part 2: Normalization. Introduction to Normalization. Normal Forms.
Chapter 5: Logical Database Design and the Relational Model Part 2: Normalization Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden Robert C. Nickerson ISYS
ILM Level 3 Certificate in Using Active Operations Management in the Workplace (QCF)
PAGE 1 ILM Level 3 Certificate in Using Active Operations Management in the Workplace (QCF) CONTENTS Qualification Overview: ILM Level 5 Award, Certificate and Diploma in Management APPENDICES Appendix
Application development = documentation processing
Application development = documentation processing Software is documented information about activities, that can be transformed into executable computer instructions performing the activities as documented.
Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
User experience storyboards: Building better UIs with RUP, UML, and use cases
Copyright Rational Software 2003 http://www.therationaledge.com/content/nov_03/f_usability_jh.jsp User experience storyboards: Building better UIs with RUP, UML, and use cases by Jim Heumann Requirements
Lean Six Sigma Black Belt Certification Recommendation. Name (as it will appear on the certificate) Address. City State, Zip
Lean Six Sigma Black Belt Certification Recommendation Name (as it will appear on the certificate) IQF Member Number Address City State, Zip Country We the undersigned, on behalf of the Sponsoring Organization,
Business Architecture: a Key to Leading the Development of Business Capabilities
Business Architecture: a Key to Leading the Development of Business Capabilities Brent Sabean Abstract: Relatively few enterprises consider themselves to be agile, i.e., able to adapt what they do and
X: Licensed Practical Nurse Leadership Role
X: Alberta s Competency Profile 241 Priority: One Competency: X-1 Leadership Skills X-1-1 X-1-2 X-1-3 X-1-4 X-1-5 Demonstrate ability to apply critical thinking and clinical judgment to leadership skills
Methodology of WISCORE, the Wellness Impact Scorecard
Methodology of WISCORE, the Wellness Impact Scorecard. 1. Scorecard Concept and Purpose As more and more employers implement wellness programs to improve employee health, the National Business Group on
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
Overview of the Systems Security Engineering Capability Maturity Model (SSE-CMM)
Overview of the Systems Security Engineering Capability Maturity Model (SSE-CMM) S E C A T HK- 36 What is the Problem the SSE-CMM Solves? Costs Current process Improved process Process Improvement Current
Fujitsu s DFX Application
Fujitsu s DFX Application V Yukio Sekiya V Hideaki Takahashi (Manuscript received May 26, 2006) Improvements in product design are conventionally made after the start of massproduction, followed by reductions
Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21
Computer Security CIS 5370 Evaluating Systems Chapter 21 1 Evaluation Methodology 1. Set of security functionality requirements 2. Set of assurance a requirements e e 3. Methodology to determine if the
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
Introduction to OpenPPM
0 Introduction to OpenPPM Content Table Introduction to OpenPPM... 1 0.1. OpenPPM: A tool thought by and for Project Managers... 2 0.2. Project, Program and Portfolio Management... 3 0.3. What is not OpenPPM?...
Software Development Life Cycle
4 Software Development Life Cycle M MAJOR A J O R T TOPICSO P I C S Objectives... 52 Pre-Test Questions... 52 Introduction... 53 Software Development Life Cycle Model... 53 Waterfall Life Cycle Model...
CREDENTIALS & CERTIFICATIONS 2015
THE COMMUNITY FOR TECHNOLOGY LEADERS www.computer.org CREDENTIALS & CERTIFICATIONS 2015 KEYS TO PROFESSIONAL SUCCESS CONTENTS SWEBOK KNOWLEDGE AREA CERTIFICATES Software Requirements 3 Software Design
2. What type of job are you seeking? It can help to have a specific objective or use the position to craft a targeted resume.
The Purpose of a Resume A Marketing Tool: Designed to capture attention and get you to the next stage in the recruitment process. It presents the skills, accomplishments and qualifications that you bring
Using Workflow Technology to Manage Flexible e-learning Services
Educational Technology & Society 5(4) 2002 ISSN 1436-4522 Using Workflow Technology to Manage Flexible e-learning Services Joe Lin, Charley Ho, Wasim Sadiq, Maria E. Orlowska Distributed Systems Technology
There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.
ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances
9.4. The Scalar Product. Introduction. Prerequisites. Learning Style. Learning Outcomes
The Scalar Product 9.4 Introduction There are two kinds of multiplication involving vectors. The first is known as the scalar product or dot product. This is so-called because when the scalar product of
DATA MODELING AND RELATIONAL DATABASE DESIGN IN ARCHAEOLOGY
DATA MODELING AND RELATIONAL DATABASE DESIGN IN ARCHAEOLOGY by Manuella Kadar Abstract. Data from archaeological excavation is suitable for computerization although they bring challenges typical of working
EXERCISE 1: HR System Implementation
EXERCISE 1: HR System Implementation You have been asked to step in and lead a new HR system implementation project eight months prior to its launch date. The project previously had no Project Manager
WHAT ARE REFERENCE LETTERS AND WHEN ARE THEY USED?
REFERENCE LETTERS These slides provide important information about the purpose of reference letters, the differences in the types of reference letters, and the information that should be included in reference
LetsVi: A Collaborative Video Editing Tool Based on Cloud Storage
LetsVi: A Collaborative Video Editing Tool Based on Cloud Storage Hyeong-Bae An Department of Electrical/Electronic and Computer Engineering, University of Ulsan, Nam-gu, Ulsan, South Korea. E-mail: [email protected]
Software Development Life Cycle Models- Comparison, Consequences
Software Development Life Cycle Models- Comparison, Consequences Abstract- Software Development Life Cycle is a well defined and systematic approach, practiced for the development of a reliable high quality
The Agile PMO. Contents. Kevin Thompson, Ph.D., PMP, CSP Agile Practice Lead cprime, Inc. 4100 E. Third Avenue, Suite 205 Foster City, CA 94404
The Agile PMO Kevin Thompson, Ph.D., PMP, CSP Agile Practice Lead cprime, Inc. 4100 E. Third Avenue, Suite 205 Foster City, CA 94404 [email protected] Abstract The development of Agile processes
Human Capital Advantage for Business What is the Value of ADP ihcm for CEOs?
Human Capital Advantage for Business What is the Value of ADP ihcm for CEOs? HR.Payroll.Benefits. ADP ihcm: Rethink Human Capital Management The need for HR to be a true business partner has never been
NEW CONCEPTS IN THE CHANGE MANAGEMENT WITHIN PUBLIC ORGANIZATIONS
NEW CONCEPTS IN THE CHANGE MANAGEMENT WITHIN PUBLIC ORGANIZATIONS Ph.D Student Laurentiu Barcan University of Craiova Faculty of Economics and Business Administration, Craiova, Romania Abstract: Knowledge
How To Improve A Test Process
Certified Tester Expert Level Modules Overview Version 1.1, 12th April 2013 Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. Version 1.1 Page
METHODOLOGY FOR ASSESSMENT OF NON-FORMAL AND INFORMAL LEARNING ACHIEVEMENTS IN A STUDY PROCESS
TIMA-Balt Leonardo da Vinci programme project TRANSFER OF INNOVATIVE METHODOLOGY FOR ASSESSMENT OF VET TEACHERS PRIOR LEARNING LLP-LdV-TOI-2007-LT-0004 Contents: Introduction I. Principles II. Prerequisites
Information Technology Engineers Examination
Information Technology Engineers Examination Outline of ITEE Ver 2.1 November 30, 2015 The company and products names in this report are trademarks or registered trademarks of the respective companies.
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Requirements EDAM-5002. WORD STUDY K-3: PRINT AWARENESS, LETTER KNOWLEDGE, PHONICS, AND HIGH FREQUENCY WORDS
LETTER OF ENDORSEMENT: TEACHER LEADERSHIP AND INSTRUCTIONAL COACHING Requirements Dr. Grace Surdovel, Director of Master's Programs/Faculty of Practice The Letter of Endorsement in Teacher Leadership and
Learning Design and Technology. Guide to PhD Program. Educational Technology
Learning Design and Technology Guide to PhD Program Educational Technology Department of Curriculum and Instruction Purdue University West Lafayette, IN 47907-2098 http://www.edci.purdue.edu/learning_design_and_technology
EFPIA Principles for the Development of the EU Clinical Trials Portal and Database
Position Paper EFPIA Principles for the Development of the EU Clinical Trials Portal and Database Executive summary EFPIA sees the implementation of the Clinical Trials Regulation 1 as an opportunity to
EFFICIENT COMPLAINT MANAGEMENT WITH TARGENIO
EFFICIENT COMPLAINT MANAGEMENT WITH TARGENIO Content Targenio Use Case Complaint Process... 3 1. Handling of inbound processes... 3 2. Customer administration and contact history... 6 3. Register of customer
Workforce Reputation in the Cloud. Human Capital Management Better Understands its Workforce
Workforce Reputation in the Cloud Human Capital Management Better Understands its Workforce If only HR knew what HP knows, we would be three-times more productive. Lew Platt Former Chairman, President,
Fibonacci Numbers and Greatest Common Divisors. The Finonacci numbers are the numbers in the sequence 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144,...
Fibonacci Numbers and Greatest Common Divisors The Finonacci numbers are the numbers in the sequence 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144,.... After starting with two 1s, we get each Fibonacci number
Algorithm & Flowchart & Pseudo code. Staff Incharge: S.Sasirekha
Algorithm & Flowchart & Pseudo code Staff Incharge: S.Sasirekha Computer Programming and Languages Computers work on a set of instructions called computer program, which clearly specify the ways to carry
To order the book click on the link, http://www.nelsonbrain.com/shop/micro/oap-hrpa6
Recruitment and Selection Author: Professor Mary Jo Ducharme, School of Human Resources Management York University Required Text: V.M. Catano, W.H. Wiesner, R.D. Hackett, L.L. Methot., Recruitment and
The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception
1060 The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception Doo H. Lim University of Tennessee Learning style has been an important area of study
Practitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
Certification criteria for. Internal QMS Auditor Training Course
Certification criteria for Internal QMS Auditor Training Course CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE CONTENT 6. COURSE
University Mission. Strategic Plan. Organisation Structure. Jobs
Introduction The main purpose of any job description is to outline the main duties and responsibilities that are involved in a particular job. Additional information is often requested in order that one
Using an Instructional Systems Development Model as a Framework for Research on Scale Up 1
Using an Instructional Systems Development Model as a Framework for Research on Scale Up 1 Michael R. Vitale East Carolina University Nancy R. Romance Florida Atlantic University Abstract This paper presents
Utilizing Domain-Specific Modelling for Software Testing
Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract
Overview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Other Required Courses (14-18 hours)
1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900
Business Process Management The Must Have Enterprise Solution for the New Century
Business Process Management The Must Have Enterprise Solution for the New Century 15200 Weston Parkway, Suite 106 Cary, NC 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-Mail: [email protected] WWW:
