100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Overig

D487 STUDY GUIDE

Beoordeling
-
Verkocht
-
Pagina's
5
Geüpload op
30-05-2025
Geschreven in
2024/2025

D487 STUDY GUIDE

Instelling
D487
Vak
D487









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
D487
Vak
D487

Documentinformatie

Geüpload op
30 mei 2025
Aantal pagina's
5
Geschreven in
2024/2025
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

D487 STUDY GUIDE

Building Security In Maturity Model (BSIMM) - Answers :A study of real-world software
security initiatives organized so that you can determine where you stand with your
software security initiative and how to evolve your efforts over time

SAMM - Answers :offers a roadmap and a well-defined maturity model for secure
software development and deployment, along with useful tools for self-assessment and
planning.

Core OpenSAMM activities - Answers :Governance
Construction
Verification
Deployment

static analysis - Answers :Source code of an application is reviewed manually or with
automatic tools without running the code

dynamic analysis - Answers :Analysis and testing of a program occurs while it is being
executed or run

Fuzzing - Answers :Injection of randomized data into a software program in an attempt
to find system failures, memory leaks, error handling issues, and improper input
validation

OWASP ZAP - Answers :-Open-source web application security scanner
-Can be used as a proxy to manipulate traffic running through it (even https)

ISO/IEC 27001 - Answers :Specifies requirements for establishing, implementing,
operating, monitoring, reviewing, maintaining and improving a documented information
security management system

ISO/IEC 17799 - Answers :ISO/EIC is a joint committee that develops and maintains
standards in the IT industry. is an international code of practice for information security
management. This section defines confidentiality, integrity and availability controls.

ISO/IEC 27034 - Answers :A standard that provides guidance to help organizations
embed security within their processes that help secure applications running in the
environment, including application lifecycle processes

Software security champion - Answers :a developer with an interest in security who
helps amplify the security message at the team level

, waterfall methodology - Answers :a sequential, activity-based process in which each
phase in the SDLC is performed sequentially from planning through implementation and
maintenance

Agile Development - Answers :A software development methodology that delivers
functionality in rapid iterations, measured in weeks, requiring frequent communication,
development, testing, and delivery.

Scrum - Answers :an agile project management framework that helps teams structure
and manage their work through a set of values, principles, and practices

Daily scrum - Answers :daily time-boxed event of 15 minutes, or less, for the
Development Team to re-plan the next day of development work during a Sprint.
Updates are reflected in the Sprint Backlog.

Sprint review - Answers :A meeting that occurs after each sprint to show the product or
process to stakeholders for approval and to receive feedback.

Sprint retrospective - Answers :an opportunity for the Scrum Team to inspect itself and
create a plan for improvements to be enacted during the next Sprint.

Sprint planning - Answers :A collaborative event in Scrum in which the Scrum team
plans the work for the current sprint.

Threat Modeling Steps - Answers :Identify security objectives
Survey the application
Decompose it
Identify threats
Identify Vulnerabilities

Scrum master - Answers :A person who ensures that the team is productive, facilitates
the daily Scrum, enables close cooperation across all roles and functions, and removes
barriers that prevent the team from being effective

Communication security - Answers :New standard for managing traffic and sessions

DREAD - Answers :D - Damage potential
R - Reproducibility
E - Exploitability
A - Affected users
D - Discoverability

Throttling - Answers :a technique that ensures that the flow of data being sent into a
target can be digested at an acceptable rate

Data classification requirement - Answers :credit cards, pii, phi

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GEEKA YALA UNIVERSITY
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2011
Lid sinds
3 jaar
Aantal volgers
1447
Documenten
48584
Laatst verkocht
7 uur geleden

3,8

345 beoordelingen

5
172
4
61
3
44
2
16
1
52

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen