Security: Requirements
Security: Requirements
Threats
- Integrity
- Decision Made Using Falsified Data
- Misinformation Masquerading As USG Material
- Confidentiality
- Active Attack
- Inadvertent Release of Sensitive Material
- Denial of Service
Scope
- Internal
- Adaptable Configuration
- Rapid Response to New Needs
- Cross division use
- External
- Ensure Authentic Communication Channel
- Compatibility
- Survivability