Index
A
access paths, 31
ACM (Association for Computing Machinery), 12
acquirers, 57
acquisition. See software acquisition
acquisition cases
acquisition of COTS software, 151–158
acquisition organization that specifies requirements as RFP, 151
acquisition organization with typical client role, 151–156
activities (BSIMM), 310, 315–318
ADM (Asset Definition and Management) process area, 66
Alberts, Christopher, 13
alert originators (AOs), 14
alerts, emergency
definition of, 14
WEA (Wireless Emergency Alerts) case study
mission thread example, 217–219
preparation for mission thread analysis, 213–215
alignment of risk, 8
Allspaw, John, 160
analysis. See gap analysis; malware ...
Get Cyber Security Engineering: A Practical Approach for Systems and Software Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.