WGU C706 SECURE SOFTWARE DESIGN STUDY GUIDE,VERY WELL EXPLAINED.
CIA Triad: Confidentiality: In information security, confidentiality “is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes” Integrity: In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This can be also used to validate databases to make sure none of the data is corrupt or modified in an unauthorized matter. Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. Secure Software Design Feature: Confidentiality: Public Key Infrastructure (PKI) and Cryptography/Encryption Availability: Offsite back-up and Redundancy Integrity: Hashing, Message Digest (MD5), non repudiation and digital signatures Software Architect: The software architect moves analysis to implementation and analyzes the requirements and use cases as activities to perform as part of the development process. That person can also develop class diagrams. Security Practitioner Roles: Release Manager: Deployment Architect: Design Developer: Coding Business Analyst/ ……………………………………………………………………………………………………………………………………… ……………………………………………….Total of 10 pages………………………………………………………………
Geschreven voor
- Instelling
- Western Governors University
- Vak
- IT C706 (ITC706)
Documentinformatie
- Geüpload op
- 1 juni 2021
- Aantal pagina's
- 19
- Geschreven in
- 2020/2021
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
wgu c706 secure software design study guide
-
confidentiality in information security
-
confidentiality is the property
-
that information is not made available or disclosed to unauthorized individua