100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

D487 - SECURE SOFTWARE DESIGN

Puntuación
-
Vendido
-
Páginas
5
Subido en
30-05-2025
Escrito en
2024/2025

D487 - SECURE SOFTWARE DESIGN

Institución
D487
Grado
D487









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D487
Grado
D487

Información del documento

Subido en
30 de mayo de 2025
Número de páginas
5
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

D487 - SECURE SOFTWARE DESIGN
SDLC Phase 1 - Answers :planning - a vision and next steps are created

SDLC Phase 2 - Answers :requirements - necessary software requirements are
determined

SDLC Phase 3 - Answers :design - requirements are prepared for the technical design

SDLC Phase 4 - Answers :implementation - the resources involved in the application
from a known resource are determined

SDLC Phase 5 - Answers :testing - software is tested to verify its functions through a
known environment

SDLC Phase 6 - Answers :deployment - security is pushed out

SDLC Phase 7 - Answers :maintenance - ongoing security monitoring is implemented

SDLC Phase 8 - Answers :end of life - the proper steps for removing software
completely are considered

BSIMM - Answers :a study of real-world software security that allows you to develop
your software security over time

OWASP SAMM - Answers :flexible framework for building security into a software
development organization

Static Analysis - Answers :the analysis of computer software that is performed without
executing programs

Dynamic Analysis - Answers :the analysis of computer software that is performed when
executing programs on a real or virtual processor in real time

Fuzz Testing - Answers :automated or semi-automated testing that provides invalid,
unexpected, or random data to the computer software program

Waterfall Development - Answers :software development methodology that breaks
down development activities into linear sequential phases; each phase depends on the
deliverables of the previous one and corresponds to a specialization of tasks

Waterfall Phases (typical) - Answers :plan -> build -> test -> review -> deploy

Iterative Waterfall Development - Answers :each phase of a project is broken down into
its own waterfall phases

, Agile Development - Answers :software development methodology that delivers
functionality in rapid iterations called timeboxes, requiring limited planning but frequent
communication

Scrum - Answers :framework for Agile that prescribes for teams to break work into goals
to be completed within sprints

Scrum Master (Scrum Role) - Answers :responsible for ensuring a Scrum team is
operating as effectively as possible by keeping the team on track, planning and leading
meetings, and working out any obstacles the team might face

Product Owner (Scrum Role) - Answers :ensures the Scrum team aligns with overall
product goals by managing the product backlog by ordering work by priority, setting the
product vision for the team, and communicating with external stakeholders to translate
their needs to the team

Development Team (Scrum Role) - Answers :professionals who do the hands-on work
of completing the tasks in a Scrum sprint by lending their expertise to program, design,
or improve products

Lean Development - Answers :software development methodology that focuses on
further isolating risk to the level of an individual feature

V-Model - Answers :a variation of the waterfall model, where the stage is turned back
upwards after the coding phase

Extreme Programming (XP) - Answers :an Agile methodology that is intended to
improve software quality and responsiveness

Software Security Architect - Answers :ensures that the stakeholder security
requirements necessary to protect the organization's mission and business processes
are adequately addressed

Software Security Champion - Answers :an expert on promoting security awareness,
best practices, and simplifying software security

Software Security Evangelist - Answers :an expert to promote awareness of products to
the wider software community

Functional Requirements - Answers :describe what the system will do and its core
purpose

Non-Functional Requirements - Answers :describe any constraints or restrictions on a
design but do not impact the core purpose of the system
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2011
Miembro desde
3 año
Número de seguidores
1447
Documentos
48584
Última venta
4 horas hace

3.8

345 reseñas

5
172
4
61
3
44
2
16
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes