Secure Software Design Study Guide - C706 With Questions And 100% SURE
ANSWERS
Terms in this set (127)
Information is not made available or disclosed to unauthorized individuals, entities, or
Confidentiality processes. Ensures unauthorized persons are not able to read private and sensitive data. It is
achieved through cryptography.
Ensures unauthorized persons or channels are not able to modify the data. It is accomplished
Integrity
through the use of a message digest or digital signatures.
The computing systems used to store and process information, the security controls used to
protect information, and the communication channels used to access information must be
Availability functioning correctly. Ensures system remains operational even in the event of a failure or an
attack. It is achieved by providing redundancy or fault tolerance for a failure of a system and its
components.
Ensure Confidentiality Public Key Infrastructure (PKI) and Cryptography/Encryption
Secure Software Design Study Guide - C706
1/11
, Ensure Availability Offsite back-up and Redundancy
Moves analysis to implementation and analyzes the requirements and use cases as activities to
Software Architect
perform as part of the development process; can also develop class diagrams.
Release Manager,
Security Practitioner Roles
Architect, Developer, Business Analyst/Project Manager
Release Manager Deployment
Architect Design
Developer Coding
Business Analyst/Project Manager Requirements Gathering
Teams of people familiar with the infrastructure of the company and the languages of the
Red Team
software being developed. Their mission is to kill the system as the developers build it.
A method of computer program debugging that is done by examining the code without
Static Analysis executing the program. The process provides an understanding of the code structure, and can
help to ensure that the code adheres to industry standards. It's also referred as code review.
A widely used hash function producing a 128-bit hash value. Initially designed to be used as a
MD5 Hash cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can
still be used as a checksum to verify data integrity, but only against unintentional corruption.
One of a number of cryptographic hash functions. A cryptographic hash is like a signature for a
SHA-256 (Secure Hash Algorithm) text or a data file. Generates an almost-unique, fixed size 32-byte
(32 X 8) hash. Hash is a one-way function - it cannot be decrypted.
A symmetric encryption algorithm. The algorithm was developed by two Belgian
Advanced Encryption Standard (AES) cryptographers Joan Daemen and Vincent Rijmen. Designed to be efficient in both hardware
and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.
Algorithms used to verify integrity MD5 Hash, SHA-256
Algorithm used to verify confidentiality Advanced Encryption Standard (AES)
Stochastic unintentional or accidental
safety-relevant faults stochastic (i.e., unintentional or accidental)
Secure Software Design Study Guide - C706
2/11
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Queenstin. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.