Preface |
|
xxv | |
Content Overview |
|
xxvii | |
Acknowledgments |
|
xxxi | |
Author |
|
xxxiii | |
Section I Concept |
|
|
Chapter 1 Quality Concept And Perspectives |
|
|
3 | (32) |
|
|
3 | (1) |
|
Part 1: Software Quality Concept |
|
|
3 | (7) |
|
Defining Software Quality |
|
|
3 | (2) |
|
Integrating Test, Security, and Audit |
|
|
5 | (1) |
|
Why Is Software Quality Important? |
|
|
6 | (1) |
|
What Is the Benefit of Software Quality in Business? |
|
|
7 | (1) |
|
Lack of Quality Is the Reason for Failure |
|
|
8 | (1) |
|
|
8 | (2) |
|
Part 2: Software Quality Characteristics |
|
|
10 | (5) |
|
What Is the Business Benefit of Quality Characteristics? |
|
|
10 | (1) |
|
Standard for Quality Characteristics ISO/IEC 9126 |
|
|
10 | (1) |
|
|
11 | (2) |
|
Detailed Descriptions of Quality Characteristics |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Maintainability Compliance |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Control Objectives for Information and Related Technology (COBIT) |
|
|
15 | (3) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Capability Maturity Model Integration (CMMI) |
|
|
17 | (1) |
|
Quality Characteristics, COBIT, and CMMI |
|
|
18 | (1) |
|
Part 3: Validation and Verification |
|
|
18 | (5) |
|
Role of V&V in Software Quality |
|
|
20 | (1) |
|
|
20 | (3) |
|
|
20 | (1) |
|
V&V Activity Summary Reports |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Determine Features to Be Tested |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Execute the Test Procedures |
|
|
23 | (1) |
|
Part 4: Reviews and Audit |
|
|
23 | (12) |
|
|
24 | (2) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
When to Conduct a Management Review |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Preparation and Execution |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (2) |
|
|
28 | (1) |
|
Inspection Rules and Procedures |
|
|
29 | (1) |
|
|
29 | (3) |
|
|
30 | (2) |
|
|
32 | (3) |
|
Chapter 2 Management And Process |
|
|
35 | (24) |
|
|
35 | (1) |
|
Part 1: Software Management |
|
|
35 | (5) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Information Governance, IT Governance, and Data Governance |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
IGEG and Strategic Planning |
|
|
36 | (1) |
|
Making the Process Systematic |
|
|
37 | (1) |
|
|
38 | (1) |
|
The Expert Models for Software Management |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
Integration of IEEE 12207 and SESC |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
Part 2: Software Life Cycle Models |
|
|
40 | (5) |
|
What Is Software Life Cycle? |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
What Is Agile? What Does It Mean? |
|
|
42 | (1) |
|
|
43 | (2) |
|
|
45 | (1) |
|
Part 3: Life Cycle Processes |
|
|
45 | (14) |
|
Primary Life Cycle Process |
|
|
46 | (6) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Supporting Life Cycle Processes |
|
|
52 | (4) |
|
|
52 | (1) |
|
Configuration Management Process |
|
|
52 | (1) |
|
Quality Assurance Process |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
Section II Testing |
|
|
Chapter 3 Testing: Concept And Definition |
|
|
59 | (14) |
|
|
59 | (1) |
|
Part 1: Testing in the Software Life Cycle |
|
|
59 | (1) |
|
What Is Software Testing? |
|
|
59 | (1) |
|
|
60 | (2) |
|
Identification and Specification |
|
|
60 | (1) |
|
|
60 | (1) |
|
Functional System Development |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Are We Building the Right System? |
|
|
61 | (1) |
|
Are We Building the System Right? |
|
|
62 | (1) |
|
Part 2: Software Testing Life Cycle |
|
|
62 | (3) |
|
|
63 | (2) |
|
Part 3: Kinds/Types of Testing |
|
|
65 | (6) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Incremental Integration Testing |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Install/Uninstall Testing |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (2) |
|
Chapter 4 Testing: Plan And Design |
|
|
73 | (30) |
|
|
73 | (1) |
|
Part 1: Plan and Strategy |
|
|
73 | (1) |
|
|
73 | (4) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Document Change Control Log |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Software Product Overview/Project Description |
|
|
75 | (1) |
|
|
75 | (1) |
|
Software Risk Issue and Mitigation |
|
|
76 | (1) |
|
Communication and Status Reporting |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Part 2: Test Approach and Stages |
|
|
77 | (6) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
System/Integration Testing |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Sample Entry/Exit Criteria |
|
|
80 | (1) |
|
|
81 | (1) |
|
Defect Reporting and Tracking |
|
|
81 | (2) |
|
Roles and Responsibilities |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (4) |
|
|
84 | (4) |
|
|
88 | (1) |
|
What Could Have Gone Better |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Top Three Recommended Improvements |
|
|
88 | (1) |
|
Part 3: Test Design Factors |
|
|
88 | (7) |
|
|
88 | (1) |
|
Requirement Identification |
|
|
89 | (1) |
|
|
89 | (1) |
|
Software Requirement Specification |
|
|
90 | (1) |
|
Requirements Evaluation Matrix |
|
|
91 | (2) |
|
Business Value of Requirements |
|
|
93 | (1) |
|
|
93 | (1) |
|
Significant Requirement Conflicts and Enablers |
|
|
93 | (1) |
|
Estimated Costs and Risks to Satisfy Requirements |
|
|
93 | (1) |
|
|
94 | (1) |
|
Requirements Cost/Benefit and Prioritization Summary |
|
|
94 | (1) |
|
Part 4: Test Case Specification and Design |
|
|
95 | (8) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Testing Condition 1.1Login with Correct User ID and Password |
|
|
97 | (1) |
|
Testing Condition 1.2Wrong User ID |
|
|
97 | (1) |
|
Testing Condition 1.3Wrong Password |
|
|
98 | (1) |
|
Testing Condition 1.4Username Blank |
|
|
98 | (1) |
|
Testing Condition 1.5Password Blank |
|
|
99 | (1) |
|
Testing Condition 1.6Username and Password Blank |
|
|
99 | (1) |
|
Testing Condition 1.7Cancel Button Clicked |
|
|
100 | (1) |
|
Testing Condition 1.8Invalid User |
|
|
100 | (1) |
|
|
101 | (2) |
|
Chapter 5 Test: Execution And Reporting |
|
|
103 | (18) |
|
|
103 | (1) |
|
Part 1: Starting Test Execution |
|
|
103 | (4) |
|
Getting Ready to Start Test Execution |
|
|
103 | (1) |
|
|
104 | (1) |
|
Requirements Test Coverage Statement |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (2) |
|
Part 2: Test Result Reporting |
|
|
107 | (5) |
|
|
107 | (1) |
|
Daily Stand-Up Update by Individual |
|
|
107 | (1) |
|
Weekly Status Report Template |
|
|
108 | (1) |
|
Test Result Summary Report |
|
|
109 | (1) |
|
Document Change Control Log |
|
|
109 | (1) |
|
|
109 | (1) |
|
References: (Sample Reference Metrics) |
|
|
109 | (1) |
|
Progression Test Case Execution Status |
|
|
110 | (1) |
|
Regression Test Case Execution Status |
|
|
111 | (1) |
|
Part 3: View and Analyze Test Results |
|
|
112 | (9) |
|
Defect: As a Part of Test Result |
|
|
112 | (1) |
|
Requirement Test CaseDefect Traceability Metrics |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (2) |
|
Requirement Traceability Matrices (RTM) |
|
|
115 | (1) |
|
System Test Coverage Metrics (Sample) |
|
|
116 | (1) |
|
Test Execution Quality Metrics |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (4) |
Section III Challenges |
|
|
Chapter 6 Incident Management |
|
|
121 | (24) |
|
|
121 | (1) |
|
Overview on Incident Management |
|
|
121 | (1) |
|
Why Incident Management Is Important |
|
|
122 | (1) |
|
|
123 | (5) |
|
|
123 | (1) |
|
|
123 | (1) |
|
Information Security Incident |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Identifying the Attacking Hosts |
|
|
125 | (1) |
|
Incident Initial Documentation |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
127 | (1) |
|
|
127 | (1) |
|
Part 2: Investigation and Analysis |
|
|
128 | (5) |
|
|
128 | (1) |
|
|
128 | (2) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Six Steps for Successful Incident Investigation |
|
|
130 | (1) |
|
|
130 | (1) |
|
Some Examples of Analyzing an Incident |
|
|
131 | (2) |
|
|
131 | (1) |
|
Damage Mode Effect Analysis |
|
|
132 | (1) |
|
|
132 | (1) |
|
Time/Loss Analysis for Emergence Response Evaluation |
|
|
133 | (1) |
|
|
133 | (1) |
|
Part 3: Response and Recovery |
|
|
133 | (6) |
|
|
133 | (3) |
|
Initiate Recovery Mechanisms |
|
|
136 | (1) |
|
Review Preliminary Investigation Results |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
Evidence Collection and Documentation |
|
|
138 | (1) |
|
|
139 | (2) |
|
|
139 | (1) |
|
Project Issues List Instructions |
|
|
139 | (2) |
|
|
141 | (1) |
|
Part 5: Security Incidents |
|
|
141 | (4) |
|
Security Incidents Reporting |
|
|
141 | (1) |
|
Before an Incident Happens the Team Should |
|
|
141 | (1) |
|
After an Incident Happens |
|
|
141 | (1) |
|
Responding to a Security Incident |
|
|
142 | (1) |
|
Tips for Responding to Security Incidents |
|
|
142 | (1) |
|
Steps to Take during the Incident |
|
|
142 | (1) |
|
Responding to Security Violations |
|
|
142 | (3) |
|
|
143 | (2) |
|
Chapter 7 Defect Management |
|
|
145 | (26) |
|
|
145 | (1) |
|
Part 1: Definition and Analysis |
|
|
145 | (8) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
What Causes Defects in Software |
|
|
146 | (2) |
|
|
148 | (1) |
|
What Is the Cost of Defects Not Being Detected Early? |
|
|
148 | (2) |
|
|
150 | (1) |
|
Step 1: Recognition or Identification |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Reduce the Risk of Failure |
|
|
151 | (1) |
|
Reduce the Cost of Testing |
|
|
151 | (1) |
|
|
151 | (2) |
|
Address Causes of Defects |
|
|
152 | (1) |
|
Institutionalize a Defined Process |
|
|
152 | (1) |
|
Implement the Action Proposals |
|
|
153 | (1) |
|
Part 2: Process and Methodology |
|
|
153 | (1) |
|
Defect Management Process |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
Roles and Responsibilities in Software Development Life Cycle |
|
|
154 | (9) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Conflict Resolution and Escalations during Defect |
|
|
155 | (1) |
|
Defect Management Methodology |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Part 3: Root Cause Analysis |
|
|
163 | (8) |
|
|
163 | (1) |
|
|
163 | (2) |
|
|
164 | (1) |
|
Defect Cause in Requirement |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
The Most Common Root Cause Classification |
|
|
165 | (2) |
|
|
167 | (3) |
|
Benefits of Defect Prevention |
|
|
167 | (3) |
|
|
170 | (1) |
|
Chapter 8 Risk, Vulnerability, And Threat Management |
|
|
171 | (40) |
|
|
171 | (1) |
|
|
171 | (13) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Risk Management Life Cycle |
|
|
174 | (1) |
|
|
174 | (1) |
|
Ten Effective Methods to Identify Risks |
|
|
174 | (2) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Practical Experience and Understanding |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (5) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Risk Assessment Involves Identified Risks |
|
|
178 | (1) |
|
Technology Risk Assessment and Mitigation (TRAM) (Sample) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
Technology Contingency Plan (TCP) (Sample) |
|
|
184 | (1) |
|
Application Risk Questionnaire (ARQ) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Part 2 Vulnerability, Risk, and Threat Analysis |
|
|
184 | (8) |
|
|
185 | (3) |
|
Step 1: Determine What Is Being Protected and Why |
|
|
185 | (1) |
|
|
186 | (1) |
|
Step 2: Identify the System |
|
|
186 | (1) |
|
Step 3: Characterize System Operations |
|
|
187 | (1) |
|
Step 4: Ascertain What One Does and Does Not Have Control Over |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Four Steps of Risk Assessment |
|
|
189 | (3) |
|
Step 1: Analysis Techniques Are Selected and Used |
|
|
189 | (1) |
|
Step 2: Identify Vulnerabilities, Their Type, Source, and Severity |
|
|
190 | (1) |
|
Step 3: Identify Threats, Their Type, Source, and Likelihood |
|
|
190 | (1) |
|
Step 4: Evaluate Transaction Paths, Threat Zones, and Risk Exposure |
|
|
190 | (2) |
|
Part 3: OCTAVE and Risk Management |
|
|
192 | (5) |
|
|
192 | (2) |
|
|
194 | (1) |
|
Phase 1: Build Asset-Based Threat Profiles |
|
|
194 | (1) |
|
Phase 2: Identify Infrastructure Vulnerabilities |
|
|
195 | (1) |
|
Phase 3: Develop Security Strategy and Plans |
|
|
195 | (1) |
|
OCTAVE Way of Risk Management |
|
|
195 | (2) |
|
OCTAVE in Risk Management |
|
|
196 | (1) |
|
|
197 | (7) |
|
Vulnerability/Risk Assessment |
|
|
197 | (5) |
|
For Pharmacy Handheld Technology |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
High-Level System Entity Control Analysis |
|
|
197 | (3) |
|
Vulnerability and Threat Analysis |
|
|
200 | (2) |
|
|
202 | (2) |
|
Virtual Private Network as a Risk |
|
|
202 | (1) |
|
The Major Strengths of Utilizing Internet-Based VPN Services |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (7) |
|
|
204 | (7) |
|
|
204 | (1) |
|
Management Process Maturity |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (5) |
Section IV Software Quality Expectation |
|
|
Chapter 9 Information Security |
|
|
211 | (66) |
|
|
211 | (1) |
|
Part 1: Definition and Importance |
|
|
211 | (13) |
|
What Is Information Security? |
|
|
211 | (2) |
|
Difference between Privacy and Security |
|
|
213 | (1) |
|
Key Points on Information Security |
|
|
213 | (1) |
|
From What Threats Does Information Need to Be Secured? |
|
|
213 | (4) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (2) |
|
What Kind of Information Needs to Be Secured |
|
|
217 | (2) |
|
Some Examples of Recent Phishing |
|
|
217 | (2) |
|
|
219 | (1) |
|
Information That Is Considered Identity |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
Current and Previous Addresses and Phone Numbers |
|
|
220 | (1) |
|
Current and Previous Employment Information |
|
|
221 | (1) |
|
Financial Account Information |
|
|
221 | (1) |
|
|
221 | (1) |
|
Other Personal Information |
|
|
221 | (1) |
|
Password for Nonfinancial Accounts |
|
|
221 | (1) |
|
Password for Financial Accounts |
|
|
221 | (1) |
|
Criminal Activities That Lead to Cybercrime |
|
|
221 | (1) |
|
|
221 | (1) |
|
Objective of Information Security |
|
|
222 | (1) |
|
Why Is Security Important? |
|
|
222 | (2) |
|
What Is the Benefit of Information Security? |
|
|
224 | (1) |
|
|
224 | (10) |
|
|
224 | (1) |
|
|
224 | (5) |
|
|
224 | (1) |
|
Control Objectives for Information and (Related) Technology (COBIT) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
Asset Classification and Control |
|
|
226 | (1) |
|
|
227 | (1) |
|
Physical and Environmental Security |
|
|
227 | (1) |
|
Communications and Operations Management |
|
|
228 | (1) |
|
|
229 | (1) |
|
System Development and Maintenance |
|
|
229 | (1) |
|
Business Continuity Management |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Refrain from Giving Out Personal Information |
|
|
231 | (1) |
|
Storing Financial Records |
|
|
231 | (1) |
|
|
231 | (1) |
|
Do Not Open Files Sent from an Unknown Source |
|
|
231 | (1) |
|
|
231 | (1) |
|
Delete All Stored Personal Information |
|
|
232 | (1) |
|
Do Not Disclose Passwords to Anyone |
|
|
232 | (1) |
|
Beware of Phishing, Spoofing, and Spam Attempts |
|
|
232 | (1) |
|
|
232 | (1) |
|
Business Model Information Security |
|
|
232 | (2) |
|
The Broader Scope of InfoSec |
|
|
234 | (2) |
|
Operational Procedure for Doctor |
|
|
234 | (1) |
|
Operational Procedure for Pharmacy |
|
|
235 | (1) |
|
Common Information Security Criteria |
|
|
236 | (23) |
|
Operational Procedure for Patient |
|
|
237 | (1) |
|
Operation Procedure for Pharmacy Hub |
|
|
237 | (1) |
|
Operational Change Control |
|
|
237 | (1) |
|
Incident Management Procedure |
|
|
238 | (1) |
|
External Facilities Management |
|
|
239 | (1) |
|
System Planning and Acceptance |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Protection against Malicious Software |
|
|
240 | (1) |
|
Control against Malicious Software |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
Media Handling and Security |
|
|
242 | (1) |
|
Management of Removable Computer Media |
|
|
242 | (1) |
|
|
242 | (1) |
|
Exchange of Information and Software |
|
|
242 | (1) |
|
Security of Media in Transit |
|
|
243 | (1) |
|
Electronic Commerce Security |
|
|
243 | (1) |
|
Security of Electronic Mail |
|
|
243 | (1) |
|
Business Requirement for Access Control |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
Review of User Access Rights |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (2) |
|
Policy on Use of Network Services |
|
|
246 | (1) |
|
Remote Diagnostic Port Protection |
|
|
246 | (1) |
|
Network Connection Control |
|
|
247 | (1) |
|
Operating System Access Control |
|
|
248 | (1) |
|
Automatic Terminal Identification |
|
|
248 | (1) |
|
Terminal Log-On Procedures |
|
|
248 | (1) |
|
User Identification and Authentication |
|
|
248 | (1) |
|
Password Management System |
|
|
248 | (1) |
|
|
248 | (1) |
|
Duress Alarm to Safeguard Users |
|
|
248 | (1) |
|
|
249 | (1) |
|
Limitation of Connection Time |
|
|
249 | (1) |
|
Application Access Control |
|
|
249 | (1) |
|
Information Access Restriction |
|
|
249 | (1) |
|
Sensitive System Isolation |
|
|
250 | (1) |
|
Monitoring System Access and Use |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
Mobile Computing and Teleworking |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
Security Requirements of Systems |
|
|
251 | (1) |
|
Security in Application Systems |
|
|
251 | (1) |
|
|
251 | (1) |
|
Business Continuity Management |
|
|
252 | (4) |
|
Aspects of Business Continuity Management |
|
|
252 | (1) |
|
Primary Focus of the Plan |
|
|
252 | (1) |
|
Primary Objectives of the Plan |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
Salvage Operations at the Disaster Site |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Begin Reassembly at the Recovery Site |
|
|
255 | (1) |
|
Restore Data from Backups |
|
|
255 | (1) |
|
Restore Applications Data |
|
|
255 | (1) |
|
Move Back to Restored Permanent Facility |
|
|
255 | (1) |
|
|
256 | (3) |
|
Compliance with Legal Requirements |
|
|
256 | (1) |
|
Identification of Applicable Legislation |
|
|
256 | (1) |
|
Intellectual Property Rights |
|
|
256 | (1) |
|
|
256 | (2) |
|
Reviews of Security Policy and Technical Compliance |
|
|
258 | (1) |
|
System Audit Considerations |
|
|
259 | (1) |
|
|
259 | (1) |
|
Protection of System Audit Tools |
|
|
259 | (1) |
|
Part 3: Security Policy Document |
|
|
259 | (18) |
|
Information Security Policy |
|
|
260 | (2) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (2) |
|
Information Security Infrastructure |
|
|
262 | (1) |
|
Management Information Security Forum |
|
|
263 | (1) |
|
Information Security Coordination |
|
|
263 | (1) |
|
Allocation of Information Security Responsibilities |
|
|
263 | (1) |
|
Authorization Process for Information Processing Facilities |
|
|
263 | (1) |
|
Specialist Information Security Advice |
|
|
264 | (1) |
|
Cooperation between Organizations |
|
|
264 | (1) |
|
Independent Review of Information Security |
|
|
264 | (1) |
|
Security of Third-Party Access |
|
|
264 | (1) |
|
Identification of Risks from Third-Party Access |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Security Requirements in Third-Party Contracts |
|
|
265 | (1) |
|
|
265 | (1) |
|
Security Requirements in Outsourcing Contracts |
|
|
265 | (1) |
|
Asset Classification and Control |
|
|
265 | (1) |
|
Accountability for Assets |
|
|
265 | (1) |
|
|
266 | (1) |
|
Information Classification |
|
|
266 | (1) |
|
Classification Guidelines |
|
|
266 | (1) |
|
Information Labeling and Handling |
|
|
266 | (2) |
|
|
268 | (1) |
|
Security in Job Definition |
|
|
268 | (1) |
|
Personnel Screening Policy |
|
|
268 | (1) |
|
|
268 | (1) |
|
Evaluate Key Job Behaviors |
|
|
268 | (1) |
|
Confidentiality Agreements |
|
|
269 | (1) |
|
Terms and Conditions for Employment |
|
|
269 | (1) |
|
|
270 | (1) |
|
Information Security Education and Training |
|
|
270 | (1) |
|
Reporting Security Incidents |
|
|
270 | (1) |
|
Security Incidents Reporting Guideline |
|
|
270 | (1) |
|
Reporting Security Weaknesses |
|
|
270 | (1) |
|
Physical and Environmental Security |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
Securing Offices, Rooms, and Facilities |
|
|
271 | (1) |
|
|
272 | (1) |
|
Protect the System from Undesirable Booting |
|
|
272 | (1) |
|
Set Up Storage Protection for Backup Tapes |
|
|
273 | (1) |
|
Equipment Sitting and Protection |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
Clear Desk and Clear Screen Policy |
|
|
273 | (1) |
|
|
274 | (1) |
|
Communication and Operation Management |
|
|
274 | (1) |
|
Operational Procedure and Responsibilities |
|
|
274 | (1) |
|
Documented Operating Procedures |
|
|
274 | (1) |
|
Information Security Certification Procedure (Sample) |
|
|
274 | (1) |
|
Document Change Control Log |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Chapter 10 Information Audit |
|
|
277 | (30) |
|
|
277 | (1) |
|
Part 1: Definition and Planning |
|
|
277 | (11) |
|
|
277 | (2) |
|
|
279 | (2) |
|
IT Audit Plan Development Process |
|
|
281 | (1) |
|
Role of Supporting Technologies |
|
|
281 | (1) |
|
Understanding the Business |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
Examining the Business Model |
|
|
283 | (1) |
|
Formalizing the IT Audit Plan |
|
|
283 | (1) |
|
Integration of the IT Audit Plan |
|
|
284 | (1) |
|
Validating the Audit Plan |
|
|
284 | (1) |
|
The IT Audit Plan Should Be Dynamic |
|
|
284 | (1) |
|
Ten Key IT Considerations for Internal Audit |
|
|
284 | (1) |
|
Responsibilities of IT Audit Team Members |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Part 2: Audit Process and Procedure |
|
|
288 | (11) |
|
|
289 | (1) |
|
Audit Process Implementation |
|
|
290 | (1) |
|
Support for the Audit Process |
|
|
290 | (1) |
|
|
290 | (5) |
|
|
290 | (1) |
|
Verification of Quality Manual |
|
|
291 | (1) |
|
Verification of Implementation of the Quality Manual |
|
|
291 | (2) |
|
|
293 | (1) |
|
Postimplementation Review |
|
|
293 | (1) |
|
|
294 | (1) |
|
Project Management Methodology Assessment |
|
|
294 | (1) |
|
Privacy and Audit Management |
|
|
295 | (1) |
|
Five Key Focus Areas for Project Audits |
|
|
295 | (4) |
|
Business and IT Alignment |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
Organizational and Process Change Management |
|
|
297 | (1) |
|
|
298 | (1) |
|
Part 3: Auditing and Information Security |
|
|
299 | (8) |
|
Defined and Planned Strategy |
|
|
299 | (1) |
|
|
299 | (1) |
|
Auditing Data Categorization |
|
|
300 | (1) |
|
Auditing Law and Regulation Aspects |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Auditing IT Vulnerabilities |
|
|
302 | (1) |
|
Identifying Insignificant Vulnerability Management |
|
|
302 | (1) |
|
The Internal Auditor's Role About Information Security |
|
|
303 | (1) |
|
|
303 | (1) |
|
Persistent Auditing and Monitoring |
|
|
304 | (3) |
|
|
305 | (2) |
|
Chapter 11 Software Reliability And Process Improvement |
|
|
307 | (36) |
|
|
307 | (1) |
|
Part 1: Definition and Measurement |
|
|
307 | (2) |
|
|
307 | (1) |
|
What Are Reliability Metrics? |
|
|
307 | (1) |
|
|
307 | (1) |
|
Standards Defining Reliability Measurement |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
Measurement-Based Assurance |
|
|
309 | (19) |
|
|
309 | (1) |
|
|
309 | (1) |
|
Primitive Cost and Effort Metrics |
|
|
310 | (1) |
|
|
310 | (1) |
|
Software Requirements Metrics |
|
|
310 | (1) |
|
Requirements Size Metrics |
|
|
310 | (1) |
|
Requirements Traceability |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
Primitive Complexity Metrics |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
Cyclomatic Complexity (C) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
Defect Removal Efficiency |
|
|
315 | (1) |
|
Primitive Test Case Metrics |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
Cumulative Failure Profile |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
Making Reliability Metrics Meaningful |
|
|
318 | (1) |
|
Standards Defining Software Measurement |
|
|
318 | (2) |
|
Productivity Metrics: IEEE 1045 |
|
|
319 | (1) |
|
Software Reliability: IEEE 982 |
|
|
319 | (1) |
|
Quality Metrics Methodology |
|
|
320 | (1) |
|
|
320 | (1) |
|
Software Reliability Measurement |
|
|
321 | (1) |
|
|
321 | (1) |
|
Qualities of a Good Model |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Model Development and Independent Metrics |
|
|
322 | (1) |
|
The Issue of Availability |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Software Reliability Estimation |
|
|
323 | (1) |
|
CMMs: The Software Engineering Institute's Capability Maturity Model |
|
|
323 | (1) |
|
|
323 | (2) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
Continuous Representation |
|
|
325 | (1) |
|
Disciplines and Environments |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Level Three Process Areas |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Part 2: Software Process Improvement and Capability Determination (SPICE) |
|
|
328 | (12) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
The Engineering Process Category |
|
|
329 | (1) |
|
The Project Process Category |
|
|
330 | (1) |
|
The Support Process Category |
|
|
330 | (1) |
|
The Organization Process Category |
|
|
330 | (1) |
|
|
330 | (2) |
|
ISO 15288 Relation to Other Frameworks |
|
|
331 | (1) |
|
Personal and Team Approaches |
|
|
332 | (1) |
|
|
332 | (1) |
|
The PSP Process Structure |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
The Team Software Process |
|
|
335 | (1) |
|
|
335 | (1) |
|
The TSP Team Working Process |
|
|
336 | (2) |
|
What Does TSP Do for Software? |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Identifying Quality Problems |
|
|
339 | (1) |
|
Finding and Preventing Quality Problems |
|
|
339 | (1) |
|
Relationship of PSP and TSP to CMM |
|
|
339 | (1) |
|
|
340 | (3) |
|
Software Process Improvement |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
341 | (2) |
|
|
341 | (1) |
|
Organization and References |
|
|
342 | (1) |
Index |
|
343 | |