100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

D487 STUDY GUIDE

Puntuación
-
Vendido
-
Páginas
5
Subido en
30-05-2025
Escrito en
2024/2025

D487 STUDY GUIDE

Institución
D487
Grado
D487









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D487
Grado
D487

Información del documento

Subido en
30 de mayo de 2025
Número de páginas
5
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

D487 STUDY GUIDE

Building Security In Maturity Model (BSIMM) - Answers :A study of real-world software
security initiatives organized so that you can determine where you stand with your
software security initiative and how to evolve your efforts over time

SAMM - Answers :offers a roadmap and a well-defined maturity model for secure
software development and deployment, along with useful tools for self-assessment and
planning.

Core OpenSAMM activities - Answers :Governance
Construction
Verification
Deployment

static analysis - Answers :Source code of an application is reviewed manually or with
automatic tools without running the code

dynamic analysis - Answers :Analysis and testing of a program occurs while it is being
executed or run

Fuzzing - Answers :Injection of randomized data into a software program in an attempt
to find system failures, memory leaks, error handling issues, and improper input
validation

OWASP ZAP - Answers :-Open-source web application security scanner
-Can be used as a proxy to manipulate traffic running through it (even https)

ISO/IEC 27001 - Answers :Specifies requirements for establishing, implementing,
operating, monitoring, reviewing, maintaining and improving a documented information
security management system

ISO/IEC 17799 - Answers :ISO/EIC is a joint committee that develops and maintains
standards in the IT industry. is an international code of practice for information security
management. This section defines confidentiality, integrity and availability controls.

ISO/IEC 27034 - Answers :A standard that provides guidance to help organizations
embed security within their processes that help secure applications running in the
environment, including application lifecycle processes

Software security champion - Answers :a developer with an interest in security who
helps amplify the security message at the team level

, waterfall methodology - Answers :a sequential, activity-based process in which each
phase in the SDLC is performed sequentially from planning through implementation and
maintenance

Agile Development - Answers :A software development methodology that delivers
functionality in rapid iterations, measured in weeks, requiring frequent communication,
development, testing, and delivery.

Scrum - Answers :an agile project management framework that helps teams structure
and manage their work through a set of values, principles, and practices

Daily scrum - Answers :daily time-boxed event of 15 minutes, or less, for the
Development Team to re-plan the next day of development work during a Sprint.
Updates are reflected in the Sprint Backlog.

Sprint review - Answers :A meeting that occurs after each sprint to show the product or
process to stakeholders for approval and to receive feedback.

Sprint retrospective - Answers :an opportunity for the Scrum Team to inspect itself and
create a plan for improvements to be enacted during the next Sprint.

Sprint planning - Answers :A collaborative event in Scrum in which the Scrum team
plans the work for the current sprint.

Threat Modeling Steps - Answers :Identify security objectives
Survey the application
Decompose it
Identify threats
Identify Vulnerabilities

Scrum master - Answers :A person who ensures that the team is productive, facilitates
the daily Scrum, enables close cooperation across all roles and functions, and removes
barriers that prevent the team from being effective

Communication security - Answers :New standard for managing traffic and sessions

DREAD - Answers :D - Damage potential
R - Reproducibility
E - Exploitability
A - Affected users
D - Discoverability

Throttling - Answers :a technique that ensures that the flow of data being sent into a
target can be digested at an acceptable rate

Data classification requirement - Answers :credit cards, pii, phi
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2011
Miembro desde
3 año
Número de seguidores
1447
Documentos
48584
Última venta
4 horas hace

3.8

345 reseñas

5
172
4
61
3
44
2
16
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes