Lesson 6-10 Secure Software Design Questions With complete verified solutions already graded A+(PASS GUARANTEED)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/142

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

143 Terms

1
New cards

Alpha level testing

testing done by the developers themselves

2
New cards

beta level testing

testing done by those not familiar with the actual development of the system

3
New cards

Black box testing

testing form an external perspective with no prior knowledge of the software

4
New cards

Design and Development (A3) phase

the third phase of the security development life cycle, in which you analyze and test software to determine security and privacy issues as you make informed decisions moving forward with your software

5
New cards

External Resources

resources hired on a temporary basis to come into a project, test the application, and report findings

6
New cards

functional testing scripts

step-by-step instructions for a specific scenario or situation

7
New cards

gray box testing

analyzes the source code for the software to help design the test cases

8
New cards

internal resources

resources from the company's organization

9
New cards

secure testing scripts

scripts created specifically for the application being tested

10
New cards

scripts

detailed, logical steps of instructions to tell a person or tool what to do during the testing

11
New cards

system test

test the system and its interaction with other systems

12
New cards

white box testing

tests from an internal perspective with full knowledge of the software

13
New cards

Vulnerability Assessment

examining a product to identify security deficiencies

14
New cards

During the A3 phase

any policy that exists outside of the SDL policy is reviewed

15
New cards

Both the software security group and the centralized information security group

must collaborate on all policies and guidelines

16
New cards

The purpose of testing activities is to

validate the security of software before making the product available

17
New cards

Applications need to be tested not only in the lab or development area but

also in their true operational environment

18
New cards

Security testing is not

static its ongoing

19
New cards

The process of scanning involves

identifying deficiencies anywhere around the system

20
New cards

Security test cases allow a software developer to determine

security issues at the lowest level

21
New cards

External testing, known as beta testing,

allows you to check usability and vulnerabilities in a system

22
New cards

Software security testing techniques are categorized by

white box, gray box, or black box testing

23
New cards

The test environment should mimic the execution environment

as closely as possible

24
New cards

The goal is to build security in, which is less costly than

correcting problems discovered after the software has been deployed.

25
New cards

Active scanner

modifies the hypertext transfer protocol secure (HTTPS) inpute and analyzes thr response to identify vulnerabilities

26
New cards

AppSec

the process of finding, fixing, and preventing security vulnerabilities at the application level

27
New cards

benchmarks

tests used to compare estimated to actual results

28
New cards

code review

a process done to identify security vulnerabilities during software development

29
New cards

control flow analysis

the mechanism used to step through logical conditions in the code

30
New cards

data flow analysis

the mechanism used to trace data from the points of input to the points of output

31
New cards

Design and Development A4 phase

the fourth phase of security development life cycle, in which you will build onto the proper process of security testing and continue to analyze necessities at the security level

32
New cards

documenation

details and guides that are necessary to support the ongoing use of the software

33
New cards

dynamic analysis

application security testing to identify vulnerabilities within a product application

34
New cards

explortatory tests

done by the development tester to continually assess the quality of his or her work

35
New cards

open source security testing methodology manual

a manual that provides templates and standards used when developing a test strategy

36
New cards

OWA SP Zed Attack Proxy

an open source security tool used widely by software security developers

37
New cards

passive scanner

silently analyzes all the hypertext transfer protocol (HTTP) requests and responses passing through the web application security tool

38
New cards

pull request

a request to merge your code into another branch

39
New cards

scheduled tests

mandatory requirements testing to validate the security of the software and associated system(s)

40
New cards

SonarQube

open-source platform for static code analysis that can detect bugs, code smells, vulnerabilities, and hotspots in over 25 programming languages

41
New cards

Spider

identifies inputs and supplies those to the scanning components of the security tools

42
New cards

Static Analysis

the analysis of computer software that is performed without executing programs

43
New cards

Zeb Attack Proxy ZAP

free, open source penetration testing tool

44
New cards

Quality assurance testing occurs

throughout the entire SDLC process

45
New cards

The three specific test type categories are

benchmarks, scheduled test, and exploratory tests

46
New cards

code review

finds and fixes a large number of security issues before the code is tested or shipped

47
New cards

The four basic techniques for code review

automated scanning, manual penetration testing, static analysis, and manual code review

48
New cards

AppSec

describes finding, fixing, and preventing vulnerabilities at the application level

49
New cards

AppSec difficult to scale for

large organizations

50
New cards

what is the goal of code review

To catch bugs early on to decrease the cost of fixing them

51
New cards

Proxy scripts

are effectively used to communicate a

web security bug or web security control

52
New cards

Active and passive scanner scripts

identify common vulnerabilities that are specific to your application

53
New cards

SonarQube give developers the ability to

continuously inspect the quality of code they produce

54
New cards

After the developer is done coding a functionality, when should code review be completed?

within hours or the same day

55
New cards

Authenticated scans

scans that require software to log onto a system to scan t

56
New cards

external scans

scans that target security issues that are found outside the firewall

57
New cards

internal scans

scans to identify security issues that a malicious attacker could exploit from inside the network

58
New cards

intrusive target search

scans to exploit a vulnerability when its identified

59
New cards

nmap

a tool used for network scanning and security auditing

60
New cards

open source software security

identifying software security within in house developed software

61
New cards

penetration testing

an authorized attack of an application to determine its weakness

62
New cards

range

a networking laboratory created to conduct vulnerability analysis testing

63
New cards

ship (A5) phase

the fifth phase of the security development lifecycle that verified that the product complies with security policies and procedures

64
New cards

SQL injection

a code injection that migh destroy your software

65
New cards

target machine

a virtual space to practice identifying attack surfaces of the machine

66
New cards

virtualization

technology used to create software services

67
New cards

vulnerability scan

explore application and databases to attempt to identify weaknesses

68
New cards

vulnerability sites

websites with information on the latest known vulnerabilities

69
New cards

The Ship A5 phase of the SDLC occurs

when the security team perfoms its final analysis and security review on the applications or software

70
New cards

Policy compliance analysis verifies

the product meet quality standards before the release of an application or software

71
New cards

Vulnerability scanning tools attempt

to identify weakness in the applicaitons

72
New cards

penetration testing simulates

the actions of a hacker to attempt to identify vulnerabilities within the software

73
New cards

the four phases of penetration testing are

assess, identify, evaluate, and plan and deploy

74
New cards

Active and passive analysis techniques are both

useful during vulnerability testing

75
New cards

Creating a network laboratory allows you

to test within a controlled environment without written authorization and permissions

76
New cards

Which activity in the Ship (A5) phase of the security development cycle sets requirements for quality gates that must be met before release?

A5 policy compliance analysis

77
New cards

Common vulnerability soring system CVSS

a model used to assess the severity of a vulnerability

78
New cards

legacy code

old code that is no longer supported

79
New cards

merger and aquisition (M&A)

when companies consolidate

80
New cards

Product Security Incident Response Team (PSIRT)

the team that receives, investigates, and reports security vulnerabilities

81
New cards

Post release support phase

the phase of the SDLC in which organizations prepare for vulnerabilities after the product has been released

82
New cards

Post release P SIRT Response

responds to software product security incidents that involve the external discovery of post release software vulnerabilities

83
New cards

software security champion SSC

an expert on promoting security awareness, best practices, and simplifying software security

84
New cards

software security evangelist (S SE)

an expert to promote awareness of products to the wider software community

85
New cards

Code Review

a practice of verification involving review of an organization's secure code to identify vulnerabilities

86
New cards

construction

a function of OpenSAMM centered around how organizations define goals and create software within development projects

87
New cards

Code review

a practice of verification involving review of an organization's secure code to identify vulnerabilities

88
New cards

construction

a function of OpenSAMM centered around how organizations define goals and create software within development projects

89
New cards

deployment

a fuction of OpenSAMM centered around how an organization releases software

90
New cards

design review (DR):

a practice of verification involving inspecting artifacts that were created from the design process

91
New cards

digital enterprise

technology used to enable and improve business activities

92
New cards

education and guidance (EG)

a practice of governance involving increasing security knowledge among software developers

93
New cards

environment hardening (EH):

a practice of deployment involving implementing controls for the operating environment of an organization's software

94
New cards

governance

a function of OpenSAMM centered on how organizations manage overall software development activities

95
New cards

Open Software Assurance Maturity Model (OpenSAMM

an open framework to help organizations implement software security tailored to the organization's specific risks

96
New cards

Operational Enablement (OE)

a practice of deployment involving identifying and capturing security-relevant information

97
New cards

policy and compliance (PC

a practice of governance involving setting up security and compliance control

98
New cards

secure architecture (SA)

a practice of construction involving activities to prompt secure-by-default designs during the design process

99
New cards

security requirements (SR)

a practice of construction involving the promoting of inclusion security requirements during software development

100
New cards

security testing (ST)

a practice of verification involving testing the organization's software in its environment