Single System of Program Documentation (SSPD)
The Single System of Program Documentation (SSPD) is a domestic complex of standards on program documentation. In a professional popular speech it is called still "the nineteenth state standard specification" that is not absolutely correct as it is not about one, and approximately about 30 different normative and technical documents.
Generally the ESPD standards contain requirements to structure, contents and document creation, describing the program at different stages of its lifecycle. Besides, several documents are devoted to an order of storage and updating of documentation.
The ESPD standards are almost deprived by a methodical component. They do not explain to the developer as it is necessary to write documentation that it turned out useful, clear, informative, convenient, etc. They give only the list of document types and the list of sections of the first level for each of them. However, about each section it is told what data should be stated in it.
The ESPD standards were adopted in the late seventies and reached us in the type close to initial. Practice of work of departmental computer centers where big computers were operated is reflected in them. Interaction of the person with a computer system then was constructed at all not as now, and it was performed via bulky panels, punched cards and printouts, and for the "mere mortals" solving applied problems also with mediation of skilled staff. Whether it is necessary to explain long as far as these standards so far became outdated? It is enough to tell that to them such documents as the user guide and the administrator guide distributed today are unknown.
And nevertheless continue to use them actively. Formally to "nineteenth" there is a modern alternative. Are translated into Russian and some ISO/IEC standards in the field of system and software engineering are adopted in Russia as national. But large, including, the state customers do not hurry to pass to them. It can be explained them with stagnancy (or correctness of tradition as it is pleasant to you more), but only partly.
Case in volume, each ESPD standard at small (pages three at most) volume represents set enough formal and therefore easily checked requirements to the document or to a documentation kit. Strictly speaking, it does not prevent the developer of documentation to write correctly issued nonsenses. But as ESPD accurately defines what should consist of and as the result should look, we can reject, at least, at once a pack of paper which does not fit into this framework. What significantly simplifies a problem of an acceptance of documentation both for the customer, and for the contractor.
The ISO/IEC standards, on the contrary, contain many reasonable rules of informative character, but it is difficult to imagine the procedure of their formal check. However, nobody prevents to apply both rows of standards at the same time, the benefit, they concern different aspects of documentation and each other practically do not contradict.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls