© Crown Copyright (2000) Module 2.0 Introduction to Module 2.

9
© Crown Copyright (2000) Module 2.0 Introduction to Module 2

Transcript of © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

Page 1: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

© Crown Copyright (2000)

Module 2.0

Introduction to Module 2

Page 2: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.1 - Security Requirements

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 3: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.2 - Development Representations

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 4: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.3 - Functional Testing

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 5: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.4 - Development Environment

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 6: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.5 - Operational Environment

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 7: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.6 - Vulnerability Analysis

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 8: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.7 - Penetration Testing

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 9: © Crown Copyright (2000) Module 2.0 Introduction to Module 2.

M2.8 - Assurance Maintenance & Composition

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE