Key Concepts in Secure Software Design D487 Questions With complete verified solutions already graded A+(PASS GUARANTEED)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

SAMM (Software Assurance Maturity Model)

A model that provides a roadmap for improving software security practices through self-assessment.

2
New cards

BSIMM (Building Security In Maturity Model)

A model that measures and compares an organization's software security practices against industry norms.

3
New cards

Purpose of SAMM

To provide a roadmap for improving software security practices through self-assessment.

4
New cards

Purpose of BSIMM

To measure and compare an organization's software security practices against industry norms.

5
New cards

Focus of SAMM

Customizable and adaptable to the specific needs of an organization.

6
New cards

Focus of BSIMM

Emphasizes benchmarking against industry peers and collecting data from real-world security initiatives.

7
New cards

Approach of SAMM

Proactive - encourages continuous improvement and integration of security practices.

8
New cards

Approach of BSIMM

Reactive - analyzes existing practices and suggests improvements based on industry data.

9
New cards

Assessment of SAMM

Involves both qualitative and quantitative analysis, with a focus on defining a maturity level.

10
New cards

Assessment of BSIMM

Primarily qualitative, based on observations and interviews, to identify common practices.

11
New cards

Applicability of SAMM

Suitable for organizations of all sizes looking to create or enhance their software security programs.

12
New cards

Applicability of BSIMM

Best suited for large organizations that want to benchmark their security practices against others.

13
New cards

Real-World Example of SAMM

A small tech startup may choose to implement SAMM because it offers a flexible approach that can be tailored to their growth and development stages.

14
New cards

Real-World Example of BSIMM

A very big organization may need to use BSIMM to benchmark its security practices with the rest of the organization in its financial industry.

15
New cards

Security Development Lifecycle (SDL)

A process of creating more secure software with security checks implemented in every phase of software development.

16
New cards

Fundamental Goal: Reduction of Security Risks

SDL proposes making security practices take a central place right from the development phase to reduce the possibility of creating vulnerable products.

17
New cards

Fundamental Goal: Compliance with Standards

SDL helps in developing software with security standards of the industries and legal frameworks, minimizing chances of legal problems or security break-ins.

18
New cards

Fundamental Goal: Continuous Improvement

SDL involves continuous evaluation and improvement of security measures in response to threat changes and technology advancement.

19
New cards

Stage: Requirements

The stage where security objectives are identified and security requirements are defined, along with conducting risk assessments.

20
New cards

Key Goal of Requirements Stage

Identify security objectives.

21
New cards

Activities Involved in Requirements Stage

Define security requirements, conduct risk assessments.

22
New cards

Incorporate security into the architecture

Threat modeling, security design reviews. Implementation

23
New cards

Write secure code

Code reviews, static analysis. Verification

24
New cards

Validate security

Penetration testing, dynamic analysis. Release

25
New cards

Secure deployment

Security sign-off, post-release monitoring. Response

26
New cards

Address security incidents

Incident response planning, patch management.

27
New cards

Real-World Example of SDL

An e-commerce company might adopt SDL to ensure that customer data is securely handled, from the design phase (where encryption methods are planned) to the release phase (where the software is tested for vulnerabilities before deployment).

28
New cards

Agile Project Management

Iterative and incremental approach with high client involvement and faster time to market.

29
New cards

Waterfall Project Management

Linear and sequential approach with low client involvement and slower time to market.

30
New cards

Flexibility in Agile vs. Waterfall

Agile is highly flexible - changes can be made throughout the project; Waterfall is less flexible - changes are costly and difficult to implement after the project starts.

31
New cards

Client Involvement in Agile vs. Waterfall

Agile has high client involvement - clients can provide feedback after each iteration; Waterfall has low client involvement - clients typically review the product only after completion.

32
New cards

Project Phases in Agile vs. Waterfall

Agile has overlapping phases - design, development, and testing happen simultaneously; Waterfall has distinct phases - each phase is completed before the next one begins.

33
New cards

Time to Market in Agile vs. Waterfall

Agile allows for faster time to market with early delivery of functional components; Waterfall is slower with full product delivered at the end of the project.

34
New cards

Real-World Example of Agile vs. Waterfall

A tech company developing a mobile app might choose Agile to quickly release and iterate on new features based on user feedback, while a government contractor building a mission-critical system might opt for Waterfall to ensure that all specifications are meticulously followed.

35
New cards

Threat Modeling Frameworks

STRIDE, DREAD, and PASTA are three popular frameworks used in threat modeling.

36
New cards

STRIDE Framework

Focuses on identifying threat types: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.

37
New cards

DREAD Framework

Focuses on assessing threat impact: Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability.

38
New cards

PASTA Framework

Risk-based threat modeling process for Attack Simulation and Threat Analysis - focuses on identifying risks from a business perspective.

39
New cards

Real-World Example of Threat Modeling

A banking application development team will utilize STRIDE to determine individual threats such as data disclosure and DoS, evaluate them using DREAD, and rank them based on their potential level of threat.