Consider the Systems Development Life Cycle (LSD), security systems life cycle, and information systems security certification and accreditation.
Write a 1- to 2-page evaluation of the use of the security life cycle. Include the following:
- Review of steps unique to the security life cycle, not in common with LSD.
- Applicable criteria and standards, such as certification and accreditation, used in your evaluation.