O'Reilly logo

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance by Carol C. Woody, Nancy R. Mead

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E. Proposed SwA Competency Mappings

When the model was developed, as part of our review process, several organizations mapped actual organizational positions to the competency model designations. This provided us with a checkpoint showing that our model designations were applicable to real organizations, and not just a theoretical exercise. These mappings are shown in Tables E.1 and E.2.

Image
Image
Image

Table E.1 Proposed SwA Competency Mappings ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required