Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU C706 Study Guide Secure Software Design Study Guide 2026 Questions Complete With Correct Answers

Puntuación
-
Vendido
-
Páginas
13
Grado
A+
Subido en
15-01-2026
Escrito en
2025/2026

WGU C706 Study Guide Secure Software Design Study Guide 2026 Questions Complete With Correct Answers Supply Chain Security Risks for Software Acquisition Lifecycle: Initiation Phase -Perform an initial software supply chain security risk assessment and establish required security properties. -Include supply chain security risk management as part of the RFP. -Develop plans for monitoring suppliers. -Select Suppliers that address supply chain security risk. Supply Chain Security Risks for Software Acquisition Lifecycle: Development Phase -Monitor practices for supply chain security risk management. -Maintain awareness of suppliers sub tier relationships. Supply Chain Security Risks for Software Acquisition Lifecycle: Configuration/Deployment Phase -Assess delivered products/systems. -Configure/integrate with consideration of supply chain security risks. -Develop user guidance to help mitigate supply chain security risk. Supply Chain Security Risks for Software Acquisition Lifecycle: Operations/Maintenance Phase -Manage security incidents. -Review operational readiness. -Monitor component/supplier. Supply Chain Security Risks for Software Acquisition Lifecycle: Disposal Phase -Mitigate risks of information disclosure during disposal. Complete Mediation · Identification of the entity making the access request · Verification that the request has not changed since its initiation. · Application of the appropriate authorization procedures · Reexamination of previously authorized requests by the same entity · Requires that all access to objects be checked to ensure they are allowed. Whenever a subject attempts to read an object, the operating system should mediate the action. First, it determines if the subject can read the object. If so, it provides the resources for the read to occur. Economy of Mechanism The principle of economy of mechanism states that security mechanisms should be as simple as possible. If a design and implementation are simple, fewer possibilities exist for errors. The checking and testing process is less complex because fewer components and cases need to be tested. Open Design Says that your system security shouldn't rely on the secrecy of your implementation. This is a particularly important principle for security concepts like cryptographic implementations. Well-designed cryptography implementations are published publicly. Least Common Mechanism States that mechanisms used to access resources should not be shared. Sharing resources provides a channel along which information can be transmitted, and so such sharing should be minimized. Ex. We don't reuse our passwords from service accounts and other subjects. Fail-Safe Defaults Design Principle (failing securely for software) Pertains to allowing access to resources based on granted access over access exclusion. This principle is a methodology for allowing resources to be accessed only if explicit access is granted to a user. By default, users do not have access to any resources until access has been granted. This approach prevents unauthorized users from gaining access to resource until access is given. Economy of Mechanism Design Principle Requires that systems should be designed as simple and small as possible. Design and implementation errors result in unauthorized access to resources that would not be noticed during normal use. Complete Mediation Design Principle States that every access to every resource must be validated for authorization. Open Design Design Principle A concept that the security of a system and its algorithms should not be dependent on secrecy of its design or implementation. Separation Privilege Design Principle Requires that all resource approved resource access attempts be granted based on more than a single condition. For example, a user should be validated for active status and has access to the specific resource. Least Common Mechanism Design Principle Declares that mechanisms used to access resources should not be shared. Psychological Acceptability Design Principle Refers to security mechanisms not make resources more difficult to access than if the security mechanisms were not present. Defense in Depth Design Principle A concept of layering resource access authorization verification in a system reduces the chance of a successful attack. This layered approach to resource authorization requires unauthorized users to circumvent each authorization attempt to gain access to a resource. Non-Functional Requirement Describe how the system works. • Logging • Error Handling • CIA + Authorization Functional Requirement Describe what the system should do.

Mostrar más Leer menos
Institución
WGU C706 Secure Software Design
Grado
WGU C706 Secure Software Design

Vista previa del contenido

WGU C706 Study Guide Secure Software Design Study
Guide 2026 Questions Complete With Correct Answers




Supply Chain Security Risks for Software Acquisition Lifecycle:

Initiation Phase

-Perform an initial software supply chain security risk assessment and establish required
security properties.
-Include supply chain security risk management as part of the RFP.
-Develop plans for monitoring suppliers.
-Select Suppliers that address supply chain security risk.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Development Phase

-Monitor practices for supply chain security risk management.
-Maintain awareness of suppliers sub tier relationships.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Configuration/Deployment Phase

-Assess delivered products/systems.
-Configure/integrate with consideration of supply chain security risks.
-Develop user guidance to help mitigate supply chain security risk.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Operations/Maintenance Phase

-Manage security incidents.
-Review operational readiness.
-Monitor component/supplier.

, Supply Chain Security Risks for Software Acquisition Lifecycle:

Disposal Phase

-Mitigate risks of information disclosure during disposal.

Complete Mediation

· Identification of the entity making the access request
· Verification that the request has not changed since its initiation.
· Application of the appropriate authorization procedures
· Reexamination of previously authorized requests by the same entity
· Requires that all access to objects be checked to ensure they are allowed. Whenever a subject
attempts to read an object, the operating system should mediate the action. First, it determines
if the subject can read the object. If so, it provides the resources for the read to occur.

Economy of Mechanism

The principle of economy of mechanism states that security mechanisms should be as simple as
possible. If a design and implementation are simple, fewer possibilities exist for errors. The
checking and testing process is less complex because fewer components and cases need to be
tested.

Open Design

Says that your system security shouldn't rely on the secrecy of your implementation. This is a
particularly important principle for security concepts like cryptographic implementations. Well-
designed cryptography implementations are published publicly.

Least Common Mechanism

States that mechanisms used to access resources should not be shared. Sharing resources
provides a channel along which information can be transmitted, and so such sharing should be
minimized. Ex. We don't reuse our passwords from service accounts and other subjects.

Fail-Safe Defaults Design Principle (failing securely for software)

Pertains to allowing access to resources based on granted access over access exclusion. This
principle is a methodology for allowing resources to be accessed only if explicit access is granted
to a user. By default, users do not have access to any resources until access has been granted.
This approach prevents unauthorized users from gaining access to resource until access is given.

Economy of Mechanism Design Principle

Escuela, estudio y materia

Institución
WGU C706 Secure Software Design
Grado
WGU C706 Secure Software Design

Información del documento

Subido en
15 de enero de 2026
Número de páginas
13
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
IszackBd University Of Washington
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
23
Miembro desde
1 año
Número de seguidores
2
Documentos
4200
Última venta
1 día hace
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Lee mas Leer menos
5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes