X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 37 / 158

468 views

0 shares

0 downloads

0 comments

37 / 158

U.S. Department of Health and Human Services

During the Development Phase, when the system is designed and constructed, an IT Administrator may participate in the following security activities:

Identification and refinement of the system’s security controls

Incorporation of the appropriate security controls within the system design and construction

This lesson will cover the following topics:

Selection and refinement of security controls;

Security control classes;

Security controls most applicable to IT Administrators; and

Security practices for IT Administrators during development.

Page 1 of 5

Development Phase Security

Lesson Introduction

Document info
Document views468
Page views468
Page last viewedSat Dec 10 23:20:36 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments