The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
RFID tag
Radio frequency spectrum
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
RFID tag
Radio frequency spectrum
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
Editing
NIST Special Publication 800-160
(section)
Back to page
Edit
Edit source
View history
Talk (0)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Overview == This publication addresses the engineering-driven actions necessary to develop more [[defensible]] and [[survivable]] [[system]]s — including the [[component]]s that compose and the services that depend on those [[system]]s. It starts with and builds upon a set of well-established International [[Standard]]s for [[system]]s and [[software engineering]] published by the [[International Organization for Standardization]] ([[ISO]]), the [[International Electrotechnical Commission]] ([[IEC]]), and the [[Institute of Electrical and Electronics Engineers]] ([[IEEE]]), and infuses [[systems security engineering]] techniques, methods, and practices into those [[system]]s and [[software engineering]] activities. The ultimate objective is to address [[security]] issues from a [[stakeholder]] requirements and protection needs perspective and to use established [[engineering]] processes to ensure that such requirements and needs are addressed with the appropriate fidelity and rigor across the entire [[life cycle]] of the [[system]]. This publication is intended to be extremely flexible in its application in order to meet the diverse needs of organizations. It is not intended to provide a specific recipe for execution. Rather, it can be viewed as a catalog or handbook for achieving the identified [[security]] outcomes of a [[systems engineering]] perspective on [[system life cycle]] [[process]]es — leaving it to the experience and expertise of the engineering organization to determine what is correct for its purpose. [[Category:Publication]] [[Category:Security]] [[Category:Technology]] [[Category:2016]]
Summary:
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Follow on IG
TikTok
Join Fan Lab