CISSP DOMAIN 8: Software Development Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/81

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:35 PM on 3/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

82 Terms

1
New cards

What is Software-Defined Security?

Security controlled and automated through software policies

2
New cards

What is CASE?

Computer-aided software engineering for high-quality development

3
New cards

What is Top-Down Programming?

Start with big picture, break into smaller parts

4
New cards

What is Bottom-Up Programming?

Build systems from smaller components upward

5
New cards

What is Freeware?

Software free to use

6
New cards

What is Shareware?

Software free initially, then requires payment

7
New cards

What is Crippleware?

Software with limited functionality

8
New cards

What is GNU License?

Allows users to run, modify, and share software freely

9
New cards

What is BSD License?

Permissive license with minimal restrictions

10
New cards

What is Apache License?

Allows modification and distribution of software

11
New cards

What is Waterfall Model?

Linear development process with no backtracking

12
New cards

What is Sashimi Model?

Overlapping waterfall phases

13
New cards

What is Agile?

Iterative and flexible development

14
New cards

What is Scrum?

Agile framework using short sprints

15
New cards

What is Extreme Programming (XP)?

Focus on rapid cycles and pair programming

16
New cards

What is Spiral Model?

Risk-driven development process

17
New cards

What is RAD?

Rapid application development

18
New cards

What is Prototyping?

Building early versions of software for feedback

19
New cards

What are SDLC phases?

Investigation, Analysis, Design, Build, Test, Implement

20
New cards

What is Source Code Escrow?

Third party holds source code

21
New cards

What are Code Repositories?

Storage for source code

22
New cards

What is API Security?

Securing communication between applications

23
New cards

What is NIST 800-128?

Configuration management guidance

24
New cards

What is a Configuration Management Plan?

Defines how systems are managed and controlled

25
New cards

What is a Configuration Control Board?

Approves system changes

26
New cards

What is Configuration Item Identification?

Identifying items to manage

27
New cards

What is Configuration Change Control?

Managing updates to baseline

28
New cards

What is Configuration Monitoring?

Ensuring compliance with baseline

29
New cards

What is DevOps?

Collaboration between development and operations

30
New cards

What is DevSecOps?

Integrating security into DevOps

31
New cards

What is a DBMS?

Software that manages databases

32
New cards

What is the Relational Model?

Data stored in tables with keys

33
New cards

What is Referential Integrity?

Foreign keys match primary keys

34
New cards

What is Entity Integrity?

Primary key is unique and not null

35
New cards

What is Semantic Integrity?

Data matches defined data types

36
New cards

What is Database Normalization?

Removing redundancy

37
New cards

What is First Normal Form (1NF)?

Atomic values and primary keys

38
New cards

What is Second Normal Form (2NF)?

Removes partial dependencies

39
New cards

What is Third Normal Form (3NF)?

Removes non-key dependencies

40
New cards

What is a Data Dictionary?

Metadata about database

41
New cards

What is Database Schema?

Structure of database

42
New cards

What is DDL?

Defines database structure

43
New cards

What is DML?

Manipulates data

44
New cards

What is a Hierarchical Database?

Tree-like structure

45
New cards

What is an Object-Oriented Database?

Stores objects instead of data types

46
New cards

What is Coupling?

Degree of dependency between modules

47
New cards

What is Cohesion?

How closely related functions are within a module

48
New cards

What is ORB?

Middleware enabling distributed object communication

49
New cards

What is COM?

Object interaction across environments

50
New cards

What is DCOM?

Networked COM

51
New cards

What is CORBA?

Vendor-neutral distributed object standard

52
New cards

What is OOA?

Object-oriented analysis

53
New cards

What is OOD?

Object-oriented design

54
New cards

What is OOM?

Object-oriented modeling

55
New cards

What does ACID stand for?

Atomicity, Consistency, Isolation, Durability

56
New cards

What is Atomicity?

All-or-nothing transactions

57
New cards

What is Consistency?

Data remains valid before and after transactions

58
New cards

What is Isolation?

Transactions do not interfere

59
New cards

What is Durability?

Data persists after commit

60
New cards

What is Broken Access Control?

Improper enforcement of access rules

61
New cards

What are Cryptographic Failures?

Weak or missing encryption

62
New cards

What is Injection?

Malicious code inserted into queries

63
New cards

What is Insecure Design?

Poor architecture leading to vulnerabilities

64
New cards

What is Security Misconfiguration?

Improper system setup

65
New cards

What are Vulnerable Components?

Outdated or insecure software

66
New cards

What are Authentication Failures?

Weak identity verification

67
New cards

What are Logging Failures?

Lack of monitoring/logging

68
New cards

What is SSRF?

Server-side request forgery

69
New cards

What is CSRF?

Unauthorized actions using user session

70
New cards

What is XSS?

Injecting scripts into web pages

71
New cards

What is a Buffer Overflow?

Writing beyond memory boundaries

72
New cards

What is a Race Condition?

Multiple processes accessing resource simultaneously

73
New cards

What is TOCTOU?

Time-of-check to time-of-use vulnerability

74
New cards

What is CMM?

Capability Maturity Model

75
New cards

What is CMM Level 1?

Initial (ad hoc)

76
New cards

What is CMM Level 2?

Repeatable

77
New cards

What is CMM Level 3?

Defined

78
New cards

What is CMM Level 4?

Managed

79
New cards

What is CMM Level 5?

Optimizing

80
New cards

What is SAMM?

Software assurance maturity model

81
New cards

What is Software Component Analysis?

Identifies vulnerable external components

82
New cards

What are Expert Systems?

Systems that mimic human decision-making

Explore top notes

note
GI
Updated 325d ago
0.0(0)
note
Chapter 7: Axial Skeleton
Updated 1080d ago
0.0(0)
note
ACC Context
Updated 669d ago
0.0(0)
note
Chapter 23: Lipids
Updated 1267d ago
0.0(0)
note
Chapter 33: Irritant Poisons
Updated 1083d ago
0.0(0)
note
Unit 2: Thermodynamics
Updated 249d ago
0.0(0)
note
Technical Understanding
Updated 611d ago
0.0(0)
note
GI
Updated 325d ago
0.0(0)
note
Chapter 7: Axial Skeleton
Updated 1080d ago
0.0(0)
note
ACC Context
Updated 669d ago
0.0(0)
note
Chapter 23: Lipids
Updated 1267d ago
0.0(0)
note
Chapter 33: Irritant Poisons
Updated 1083d ago
0.0(0)
note
Unit 2: Thermodynamics
Updated 249d ago
0.0(0)
note
Technical Understanding
Updated 611d ago
0.0(0)

Explore top flashcards

flashcards
HUMAN GEO UNIT 7
84
Updated 713d ago
0.0(0)
flashcards
Biologie- poznávačka
101
Updated 388d ago
0.0(0)
flashcards
Ders 3(1)
21
Updated 417d ago
0.0(0)
flashcards
Mitosis and Meiosis
24
Updated 772d ago
0.0(0)
flashcards
U4 Las fiestas
54
Updated 1150d ago
0.0(0)
flashcards
APUSH 7b vocab
36
Updated 749d ago
0.0(0)
flashcards
HUMAN GEO UNIT 7
84
Updated 713d ago
0.0(0)
flashcards
Biologie- poznávačka
101
Updated 388d ago
0.0(0)
flashcards
Ders 3(1)
21
Updated 417d ago
0.0(0)
flashcards
Mitosis and Meiosis
24
Updated 772d ago
0.0(0)
flashcards
U4 Las fiestas
54
Updated 1150d ago
0.0(0)
flashcards
APUSH 7b vocab
36
Updated 749d ago
0.0(0)