O'Reilly logo

The Definitive Guide to the C Transformation Process by Waylon Krush, Dr. Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 14: AUTHORIZATION AND THE SYSTEM LIFE CYCLE (SLC)

A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools.110

Douglas Adams, author of The Hitchhiker’s Guide to the Galaxy

In this chapter:

Phases of the system life cycle The phases and associated documentation

When do you really have to start paying attention to security requirements for your information system? The answer is – from the very earliest stages of planning for the system to its final disposal. By considering security early in the information system life cycle (SLC)111, you might avoid ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required