C
LO
YC
D
U
ST
D487 STUDY GUIDE FULLY
SOLVED 2024.
, Building Security In Maturity Model (BSIMM)
A study of real-world software security initiatives organized so that you can determine
where you stand with your software security initiative and how to evolve your efforts
over time
K
SAMM
offers a roadmap and a well-defined maturity model for secure software development
C
and deployment, along with useful tools for self-assessment and planning.
LO
Core OpenSAMM activities
Governance
Construction
Verification
YC
Deployment
static analysis
Source code of an application is reviewed manually or with automatic tools without
D
running the code
U
dynamic analysis
Analysis and testing of a program occurs while it is being executed or run
ST
Fuzzing
Injection of randomized data into a software program in an attempt to find system
failures, memory leaks, error handling issues, and improper input validation
OWASP ZAP
-Open-source web application security scanner
-Can be used as a proxy to manipulate traffic running through it (even https)