You are on page 1of 13

I N F O R M AT I O N S E C U R I T Y

S U M M I T LO V E R S
TEAM
SUMMIT LOVERS TEAM

1 Zeinab Salah {T.L}

2 Samar Amer

3 Hussein Shaban

4 Ziad Mady e
SECURITY FUNCTIONAL
REQUIREMENTS
Functional areas that primarily
1 require computer
security technical

Functional areas that


Contents
2 primarily involve
management
Contents

3 Functional areas that


overlap computer
security technical
Functional areas that primarily

01
require computer
security technical
Functional areas

System and
access
Information
control
Integrity

1 2 3 4

system and
identification communication
and protection
authentication
Functional areas that

02
primarily involve
management

PART TWO
Functional areas
Certification,
Accreditation,
awareness securityassess
and Security
and training ments
Assessments:

1 2 3 4

audit and contingency


accountability planning
Functional areas

risk
maintenance planning
assessment

5 6 7 8 9 10

physical and systems and


personnel
environmental services
security
protection acquisition
03
Functional areas that overlap
computer security technical

Text here Text here Text hereText here Text


PART THREE here Text here
Functional areas

configuration media

management protection

1 2 3

incident
response
links for explaning

https://youtu.be/tbsns16_r10?si=qjTPYZTZ66WMaY43
Thank you

You might also like