Secure Software Design
SDL Goals - ANS Reduce the number of vulnerability and Privacy issues
Reduce the severity of the remaining vulnerabilities
Three main goals of secure software development - ANS Quality
Security
Maintainability
What are the three threat intentio...
SDL Goals - ANS Reduce the number of vulnerability and Privacy issues
Reduce the severity of the remaining vulnerabilities
Three main goals of secure software development - ANS Quality
Security
Maintainability
What are the three threat intention categories? - ANS unintentional
Intentional but non-malicious
malicious
What are the primary issues in modeling - ANS Doing it well
Doing it thoroughly enough
Doing Knowing what to do with the results
12 categories of BSIMM - ANS Strategy and Metrics
Compliance and Policy
Training
Attack Models
Security Features and Design
Standards and Requirements
Architecture Analysis
Code Review
Security Testing
Penetration Testing
Software Environment
Configuration and Vulnerability Management
, ISO 27001 - ANS Specifies a management system intended to bring information security under
formal management control.
ISO 27034 - ANS Guidance to help organizations embed security within their processes that
help secure applications running in the environment.
SAFECode - ANS Global industry led effort to identify and promote best practices for software,
hardware and services.
DHS Software Assurance Program - ANS Created the Build Security In website (BSI) to push
security in the SDLC
NVD - ANS National Vulnerability Database
SAMATE - ANS Dedicated to improving software assurance by developing methods to enable
software tool evaluations, measuring the effectiveness of tools and techniques, and identifying
gaps in tools and methods.
What is an exposure? - ANS A mistake in software that allows access to information or
capabilities that can be used by a hacker as a stepping-stone into a system or network.
Fuzzing - ANS a technique of penetration testing that can include providing unexpected values
as input to an application to make it crash
Static Analysis - ANS The analysis of computer software that is performed without actually
executing programs
Dynamic Analysis - ANS Analysis of the code while it is executed.
Software Security Champions - ANS Software engineers/designers who are capable of
thinking like an attacker, stepping stone to an architect role.
When might Waterfall Development be used? - ANS When requirements are fully understood
and not complex.
What kinds of teams are used in Agile development - ANS Cross functional teams that are
responsible all functions in each iteration
What is the goal of Scrum? - ANS Maximize the ability to deliver quickly and respond to
emerging needs.
Lean development - ANS You select, plan, develop, test, and deploy one feature before
moving on the the next.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller DocLaura. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.