Page 357

The University of SydneyPage 18A High LevelView -Orion StrategyAcknowledgement of possible security vulnerabilityAnalyze current security situationAnalyze systems ofInformation and SecurityModel ideal IS Security situationCompare ideal security with current securityEstablish and implement Security planIdentify and analyze measures to fill gaps1237654Management directivesRich pictures security review risk analysisConceptual security modelsSecurity gaps and desired requirementsDesirable and feasible security recommendationsSecurity plan and review

Security MissionsREAL WORLDSYSTEMS THINKING WORLDINPUTS

OUTPUTS