Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


3.5.4  Phase 2 - Development of Preliminary System Design.  This second
phase builds upon the essential input data generated in Phase 1, making the
process now capable of developing candidate solutions for location and
asset-specific vulnerabilities.  The steps involved in this phase are shown
in Figure 12.
3.5.4.1  Development of Security Upgrade Plan.  The overall system concept
is set forth in the upgrade plan, which must accommodate the basic functions
(mission) of the site while still meeting the objectives of enhanced
security.  Adjustments and compromises may have to be invoked in








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business