Introduction
Section 1 Frameworks
Chapter 1 Cybersecurity
Cybersecurity Is a Wicked Problem
Need for Cybersecurity Systems Engineering
National Institute of Standards and Technology
NIST Cybersecurity Framework
Subcategories and Informative References
Implementation Tiers
Profiles
Operationalizing the NIST Cybersecurity Framework
Summary
Exercises
Exercise 1.1
Exercise 1.2
Chapter 2 Context Diagrams and Use Cases
System Lifecycles
Context Diagrams
Notation
Constraints
Relationship to Lower Level DFDs
Summary
Use Cases
Uses
Notation
Constraints
Summary
Exercises
Exercise 2.1
Exercise 2.2
Chapter 3 Work Breakdown Structures
Background
Primary Purpose
Secondary Purpose
WBS Structure
Determining WBS Levels
Work Packages
A Deliverables-Based WBS
Summary
Exercises
Exercise 3.1
Exercise 3.2
Chapter 4 Configuration Management and Change Control
Background
Basic Configuration Management Terminology
Configuration Management Planning
Plan CM Program
Establish CM Program
Manage CM Program and Improve CM Program
Relationship Between SE and CM
Summary
Exercises
Exercise 4.1
Exercise 4.2
Chapter 5 Risk Management
Background
Active Risk, Issue, and Opportunity Management
Risk Planning
Risk Appetite
Risk Identification
Risk Analysis
Risk Handling
Risk Monitoring
Issue Management
Opportunity Management
Opportunity Handling
Summary
Exercises
Exercise 5.1
Glossary
References