100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

D487 STUDY GUIDE

Rating
-
Sold
-
Pages
5
Uploaded on
30-05-2025
Written in
2024/2025

D487 STUDY GUIDE

Institution
D487
Course
D487









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
May 30, 2025
Number of pages
5
Written in
2024/2025
Type
Other
Person
Unknown

Content preview

D487 STUDY GUIDE

Building Security In Maturity Model (BSIMM) - Answers :A study of real-world software
security initiatives organized so that you can determine where you stand with your
software security initiative and how to evolve your efforts over time

SAMM - Answers :offers a roadmap and a well-defined maturity model for secure
software development and deployment, along with useful tools for self-assessment and
planning.

Core OpenSAMM activities - Answers :Governance
Construction
Verification
Deployment

static analysis - Answers :Source code of an application is reviewed manually or with
automatic tools without running the code

dynamic analysis - Answers :Analysis and testing of a program occurs while it is being
executed or run

Fuzzing - Answers :Injection of randomized data into a software program in an attempt
to find system failures, memory leaks, error handling issues, and improper input
validation

OWASP ZAP - Answers :-Open-source web application security scanner
-Can be used as a proxy to manipulate traffic running through it (even https)

ISO/IEC 27001 - Answers :Specifies requirements for establishing, implementing,
operating, monitoring, reviewing, maintaining and improving a documented information
security management system

ISO/IEC 17799 - Answers :ISO/EIC is a joint committee that develops and maintains
standards in the IT industry. is an international code of practice for information security
management. This section defines confidentiality, integrity and availability controls.

ISO/IEC 27034 - Answers :A standard that provides guidance to help organizations
embed security within their processes that help secure applications running in the
environment, including application lifecycle processes

Software security champion - Answers :a developer with an interest in security who
helps amplify the security message at the team level

, waterfall methodology - Answers :a sequential, activity-based process in which each
phase in the SDLC is performed sequentially from planning through implementation and
maintenance

Agile Development - Answers :A software development methodology that delivers
functionality in rapid iterations, measured in weeks, requiring frequent communication,
development, testing, and delivery.

Scrum - Answers :an agile project management framework that helps teams structure
and manage their work through a set of values, principles, and practices

Daily scrum - Answers :daily time-boxed event of 15 minutes, or less, for the
Development Team to re-plan the next day of development work during a Sprint.
Updates are reflected in the Sprint Backlog.

Sprint review - Answers :A meeting that occurs after each sprint to show the product or
process to stakeholders for approval and to receive feedback.

Sprint retrospective - Answers :an opportunity for the Scrum Team to inspect itself and
create a plan for improvements to be enacted during the next Sprint.

Sprint planning - Answers :A collaborative event in Scrum in which the Scrum team
plans the work for the current sprint.

Threat Modeling Steps - Answers :Identify security objectives
Survey the application
Decompose it
Identify threats
Identify Vulnerabilities

Scrum master - Answers :A person who ensures that the team is productive, facilitates
the daily Scrum, enables close cooperation across all roles and functions, and removes
barriers that prevent the team from being effective

Communication security - Answers :New standard for managing traffic and sessions

DREAD - Answers :D - Damage potential
R - Reproducibility
E - Exploitability
A - Affected users
D - Discoverability

Throttling - Answers :a technique that ensures that the flow of data being sent into a
target can be digested at an acceptable rate

Data classification requirement - Answers :credit cards, pii, phi

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2011
Member since
3 year
Number of followers
1447
Documents
48584
Last sold
5 hours ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions