It’s not a secret: what you need to know about information security to work with requirements

  • 40 min

Any analyst in his life when implementing an information system is faced with such a section in the documentation as “Information Security Requirements.” But not everyone understands which side to approach them from. 

In the report I will consider the following questions: 
1) Where do information security requirements come from? 
2) What actions need to be taken when analyzing such requirements? 

 Let's look at this topic together based on examples.


Comments ({{Comments.length}} )
  • {{comment.AuthorFullName}}
    {{comment.AuthorInfo}}
    {{ comment.DateCreated | date: 'dd.MM.yyyy' }}

To leave a feedback you need to

or
Chat with us, we are online!