From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Verification

Verification

- [Brad] Welcome back to Cybrary's ISSE course, I'm your instructor, Brad Rhodes. Let's jump into verification. So in this video, we're going to look at the definition of verification. We're going to talk about the systems security outcomes as related, and then we're going to apply verification. So when we look at verification, and we've talked about verification before, let's specifically define it here. It is all about requirements and evidence. So we create a series of requirements as ISSEs, we have to verify that those requirements are met, right? And then we have to have the evidence that shows they're met. So in the case of say, an intrusion detection system, the evidence might be the readout of the logs that shows all of the rules that were matched, right? That might be a how we verify the system works. Or in the case of a piece of hardware, perhaps it's how long does that hardware operate? Say like a smartphone, we want that smartphone to operate 24/7/365. So maybe we test the…

Contents