![]() |
![]() |
![]() |
|
![]() |
|||
| SD 2.2: Realization of Efficiency Analysis |
SE2.2 - Wirksamkeitsanalyse durchführen
Contents
|
|
|
|---|
Product Flow
| From | Product | to | Methods | Tool Req. | Ext. Norms | |||
|---|---|---|---|---|---|---|---|---|
| Activity | State | Chapter | Title | Activity | State | |||
| SD1 | accepted | Existing | User Requirements | - | - | |||
| SD2.1 | being proc. | Existing | System Architecture | - | - | |||
| - | - | 4 | System Architecture. IT Security Concept |
SD2.1 | being proc. | |||
+ "Chapter" are extra columns from the original printed version of GD 250
Handling
Apart from these weak point analyses, penetration analyses may also be used to prove the efficiency.
The execution of tests might be required for the efficiency analysis too.
Roles
| Role | Participation |
|---|---|
| IT Security Representative | responsible |
Tools Requirements
External Norms
Pre-Tailoring forms
Matrix Entries:
Always required
Always required under given circunstances
Not required
Description of data or database only
![]() |
![]() |
GDPA Online
Last Updated 01.Jan.2002
Updated by Webmaster
Last Revised 01.Jan.2002
Revised by Webmaster
![]() |