Page 218

The University of SydneyPage 24Data Security Requirements–Security mechanisms–Software Controls–Software development controls»Conformance to standards and methodologies»Testing and maintenance–Operating system controls»Protecting system and user data»Establishing extensive checklists for secure config–Controls within software programs–Controls needed at input, processing, and output levels–Balance between ease of use and level of security controls