{"id":111378,"date":"2023-08-03T19:46:57","date_gmt":"2023-08-03T19:46:57","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=111378"},"modified":"2023-08-03T19:47:03","modified_gmt":"2023-08-03T19:47:03","slug":"wgu-c706-secure-software-design-study-guide-questions-and-answers-2022-2023-verified-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/03\/wgu-c706-secure-software-design-study-guide-questions-and-answers-2022-2023-verified-answers\/","title":{"rendered":"WGU C706 Secure Software Design Study Guide Questions and Answers (2022\/2023) (Verified Answers)"},"content":{"rendered":"\n<p>WGU C706 Secure Software Design Study Guide<br>2022<br>1.Confidentiality: Information is not made available or disclosed to<br>unauthorized individuals, entities, or processes. Ensures unauthorized<br>persons are not able to read private and sensitive data. It is achieved<br>through cryptography.<br>2.Integrity: Ensures unauthorized persons or channels are not able to<br>modify the data. It is accomplished through the use of a message<br>digest or digital signatures.<br>3.Availability: The computing systems used to store and process<br>information, the security controls used to protect information, and the<br>communication channels used to access information must be<br>functioning correctly. Ensures system remains operational even in the<br>event of a failure or an attack. It is achieved by providing redundancy<br>or fault tolerance for a failure of a system and its components.<br>4.Ensure Confidentiality: Public Key Infrastructure (PKI) and<br>Cryptography\/En- cryption<br>5.Ensure Availability: Offsite back-up and Redundancy<br>6.Ensure Integrity: Hashing, Message Digest (MD5), non repudiation<br>and digital signatures<\/p>\n\n\n\n<p>7.Software Architect: Moves analysis to implementation and analyzes<br>the re- quirements and use cases as activities to perform as part of<br>the development process; can also develop class diagrams.<br>8.Security Practitioner Roles: Release Manager,<br>Architect, Developer, Business Analyst\/Project<br>Manager<br>9.Release Manager: Deployment<br>10.Architect: Design<br>11.Developer: Coding<br>12.Business Analyst\/Project Manager: Requirements Gathering<br>13.Red Team: Teams of people familiar with the infrastructure of the<br>company and the languages of the software being developed. Their<br>mission is to kill the system as the developers build it.<br>14.Static Analysis: A method of computer program debugging that is<br>done by examining the code without executing the program. The<br>process provides an understanding of the code structure, and can help<br>to ensure that the code adheres to industry standards. It&#8217;s also<br>referred as code review.<br>15.MD5 Hash: A widely used hash function producing a 128-bit hash<br>value. Initially designed to be used as a cryptographic hash function,<br>it has been found<\/p>\n\n\n\n<p>to suffer from extensive vulnerabilities. It can still be used as a<br>checksum to verify data integrity, but only against unintentional<br>corruption.<br>16.SHA-256 (Secure Hash Algorithm): One of a number of cryptographic<br>hash functions. A cryptographic hash is like a signature for a text or a<br>data file. Generates an almost-unique, fixed size 32-byte<br>(32 X 8) hash. Hash is a one-way function &#8211; it cannot be decrypted.<br>17.Advanced Encryption Standard (AES): A symmetric encryption<br>algorithm. The algorithm was developed by two Belgian<br>cryptographers Joan Daemen and Vincent Rijmen. Designed to be<br>efficient in both hardware and software, and supports a block length<br>of 128 bits and key lengths of 128, 192, and 256 bits.<br>18.Algorithms used to verify integrity: MD5 Hash, SHA-256<br>19.Algorithm used to verify confidentiality: Advanced Encryption<br>Standard (AES)<br>20.Stochastic: unintentional or accidental<br>21.safety-relevant faults: stochastic (i.e., unintentional or accidental)<br>22.security-relevant faults: &#8220;Sponsored,&#8221; i.e., intentionally created and<br>activated through conscious and intentional human agency.<br>23.Fuzz Testing: Used to see if the system has solid exception handling<br>to the input it receives. Is the use of malformed or random input into a<br>system in order to intentionally produce failure. This is a very easy<br>process of feeding garbage to the system when it expects a formatted<\/p>\n\n\n\n<p>Confidentiality<br>Information is not made available or disclosed to unauthorized individuals, entities, or processes. Ensures unauthorized persons are not able to read private and sensitive data. It is achieved through cryptography.<\/p>\n\n\n\n<p>Integrity<br>Ensures unauthorized persons or channels are not able to modify the data. It is accomplished through the use of a message digest or digital signatures.<\/p>\n\n\n\n<p>Availability<br>The computing systems used to store and process information, the security controls used to protect information, and the communication channels used to access information must be functioning correctly. Ensures system remains operational even in the event of a failure or an attack. It is achieved by providing redundancy or fault tolerance for a failure of a system and its components.<\/p>\n\n\n\n<p>Ensure Confidentiality<br>Public Key Infrastructure (PKI) and Cryptography\/Encryption<\/p>\n\n\n\n<p>Ensure Availability<br>Offsite back-up and Redundancy<\/p>\n\n\n\n<p>Ensure Integrity<br>Hashing, Message Digest (MD5), non repudiation and digital signatures<\/p>\n\n\n\n<p>Software Architect<br>Moves analysis to implementation and analyzes the requirements and use cases as activities to perform as part of the development process; can also develop class diagrams.<\/p>\n\n\n\n<p>Security Practitioner Roles<br>Release Manager,<br>Architect, Developer, Business Analyst\/Project Manager<\/p>\n\n\n\n<p>Release Manager<br>Deployment<\/p>\n\n\n\n<p>Architect<br>Design<\/p>\n\n\n\n<p>Developer<br>Coding<\/p>\n\n\n\n<p>Business Analyst\/Project Manager<br>Requirements Gathering<\/p>\n\n\n\n<p>Red Team<br>Teams of people familiar with the infrastructure of the company and the languages of the software being developed. Their mission is to kill the system as the developers build it.<\/p>\n\n\n\n<p>Static Analysis<br>A method of computer program debugging that is done by examining the code without executing the program. The process provides an understanding of the code structure, and can help to ensure that the code adheres to industry standards. It&#8217;s also referred as code review.<\/p>\n\n\n\n<p>MD5 Hash<br>A widely used hash function producing a 128-bit hash value. Initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.<\/p>\n\n\n\n<p>SHA-256 (Secure Hash Algorithm)<br>One of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. Generates an almost-unique, fixed size 32-byte<br>(32 X 8) hash. Hash is a one-way function &#8211; it cannot be decrypted.<\/p>\n\n\n\n<p>Advanced Encryption Standard (AES)<br>A symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen. Designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.<\/p>\n\n\n\n<p>Algorithms used to verify integrity<br>MD5 Hash, SHA-256<\/p>\n\n\n\n<p>Algorithm used to verify confidentiality<br>Advanced Encryption Standard (AES)<\/p>\n\n\n\n<p>Stochastic<br>unintentional or accidental<\/p>\n\n\n\n<p>safety-relevant faults<br>stochastic (i.e., unintentional or accidental)<\/p>\n\n\n\n<p>security-relevant faults<br>&#8220;Sponsored,&#8221; i.e., intentionally created and activated through conscious and intentional human agency.<\/p>\n\n\n\n<p>Fuzz Testing<br>Used to see if the system has solid exception handling to the input it receives. Is the use of malformed or random input into a system in order to intentionally produce failure. This is a very easy process of feeding garbage to the system when it expects a formatted input, and it is always a good idea to feed as much garbage as possible to an input field.<\/p>\n\n\n\n<p>Three (3) Tier<br>Removes the business logic from the client end of the system. It generally places the business logic on a separate server from the client. The data access portion of the system resides separately from both the client and the business logic platform.<\/p>\n\n\n\n<p>T-MAP<br>Defines a set of threat-relevant attributes for each layer or node. These can be classified as probability-relevant, size-of-loss relevant, or descriptive. These are primarily derived from Common Vulnerability Scoring System (CVSS). USC&#8217;s Threat Modeling based on Attacking Path analysis is a risk management approach that quantifies total severity weights of relevant attacking paths for COTS-based systems. Its strengths lie in its ability to maintain sensitivity to an organization&#8217;s business value priorities and IT environment, to prioritize and estimate security investment effectiveness and evaluate performance, and to communicate executive-friendly vulnerability details as threat profiles to help evaluate cost efficiency.<\/p>\n\n\n\n<p>Trike<br>An open source conceptual framework, methodology, and tool set designed to auto-generate repeatable threat models. Its methodology enables the risk analyst to accurately and completely describe the security characteristics of the system, from high-level architecture to low-level implementation of details. It also requires building a defensive model of the subject system.<\/p>\n\n\n\n<p>SDL Threat Modeling Tool<br>This free tool builds on Microsoft Visio and provides a tool for constructing graphic representations for the system without requiring expertise in security and also has the capability of graphically representing a software system and identifying vulnerabilities.<\/p>\n\n\n\n<p>Vulnerability Mapping<br>Used to determine the most likely locations within the system in development where an attacker will strike. This is done on the design phase of the SDLC.<\/p>\n\n\n\n<p>V3<br>The highest level of vulnerability. This is a very likely target for an attacker, such as free text input in a form. These are the highest priory for a security plan for the system and these should all be mitigated and accounted for by established control systems in development.<\/p>\n\n\n\n<p>V2<br>A moderate level vulnerability. These are possible but not probable targets. These will include inter-process communications on the server or traffic within the trust boundary of the system. Eavesdropping is the most significant risk in this situation. These vulnerabilities should always be mitigated in the system, but in a trade off analysis, strict control may not be necessary as long as a procedure is in place to fail safely and protect any private or confidential data.<\/p>\n\n\n\n<p>V1<br>The lowest priority level of vulnerability. These are unlikely venues of attack with little risk if they are exploited. Failing safely is the most important concern at this level, because the data associated with this vulnerability has no value, and the process involved is not mission critical, such as a transmission failure in an HTML header coming from the system; the highest risk is that the customer will<br>not properly see the page and it would have to be reloaded. These vulnerabilities can be largely ignored, but they should be noted in the system specification in case functionality is altered by a later system update or interaction because this may allow them to become more significant.<\/p>\n\n\n\n<p>Activity Diagram<br>Capable of expressing resolution efforts to malformed input and potential attacks in a way other documentation at the system level cannot. The caveat is that these do not contain class calls and references; they only provide a visualization of the process logic.<\/p>\n\n\n\n<p>Kiviat Diagram<br>Provides a visual comparison of multiple attributes and can visualize and report the information on a single artifact based on monitored information.<\/p>\n\n\n\n<p>Identify the Assets<br>A threat model process that allows the company to identify the part that needs to be protected from unauthorized users.<\/p>\n\n\n\n<p>Agile Model<br>Describes a set of principles for software development under which requirements and solutions evolve through the collaborative effort of self-organizing cross-functional teams. It promotes adaptive planning, evolutionary development, early delivery, and continuous improvement, and it encourages rapid and flexible response to change. Supports the definition and continuing evolution of many software development methods, avoids life cycle activities, focuses on built-a- little, test-a-little and field-a-little. It also supports informal communication and Incremental design.<\/p>\n\n\n\n<p>Types of Vulnerability Mapping<br>Activity Diagram, Kiviat Diagram, Identify the Assets, Agile Model, V1, V2, V3<\/p>\n\n\n\n<p>Agile attributes<br>Cyclical Process. Supports quick prototyping and limits the time spent thinking about the problem as a whole.<\/p>\n\n\n\n<p>Waterfall attributes<br>Similar to interactive model and main components are planning, development and deployment.<\/p>\n\n\n\n<p>Chrystal Clear attributes<br>Can be applied to teams of up to 6 or 8 co-located developers working on systems that are not life-critical. This family of methodologies focuses on efficiency and habitability as components of project safety. Focuses on people, not processes or artifacts. Roles may be filed by the same people, including a project manager and a business expert.<\/p>\n\n\n\n<p>Waterfall attributes<br>A sequential (non-iterative \/ Limited Interaction) design process, used in software development, in which progress is seen as flowing down through the phases of conception, initiation, analysis, design, construction, testing, production\/implementation and maintenance. All the requirements will be specified in the first step, uses a document driven approach (large amount of documentation) and has specific and identifiable stages. It also provides a resource to entry level developers with limited exposure.<\/p>\n\n\n\n<p>Waterfall Methodology Security concerns<br>Requirement Analysis: Define Security Features<br>Design: Misuse cases and vulnerability mapping<br>Construction and Implementation: Secure Coding practices<br>Testing: Penetration Assessment<br>Installation: Final Security Review<br>Operation or Maintenance: Periodic security review and updates<\/p>\n\n\n\n<p>Digital Signature<br>A mathematical scheme for demonstrating the authenticity of a message or document. Gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity). It also can be used as proof of approval by an authorized user.<\/p>\n\n\n\n<p>Redundancy<br>The existence of data that is additional to the actual data and permits correction of errors in stored or transmitted data. The additional data can be simply a complete copy of the actual data, or only select pieces of data that allow detection of errors and reconstruction of lost or damaged data up to a certain level. This will make sure that all data will always be available, the data will not be lost and it will be stored at a another location for failover reasons.<\/p>\n\n\n\n<p>Hashing:<br>The process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing two files bit-by-bit, but requires two copies of the same file, and may miss systematic corruptions which might occur to both files. A more popular approach is to also store checksums (message digests) of files for later comparison.<\/p>\n\n\n\n<p>Software Assurance<br>Ensures that the processes, procedures, and products used to produce and sustain the software conform to all requirements and standards specified to govern those processes, procedures, and products. This can be also used to make sure that any web application meets the requirements of what it was designed to do and accessible to all that are authorized whether in the office or at a remote location.<\/p>\n\n\n\n<p>Sandboxing, isolating trusted processes, and proper handling of errors and exceptions<br>Help secure a system in a high risk environment where the system is prone to attack.<\/p>\n\n\n\n<p>DOS or DDOS<br>A common web server attack in which unsolicited TCP requests overwhelm the web servers&#8217; resources and make it unavailable.<\/p>\n\n\n\n<p>SQL SELECT query command<br>Can allow an attacker to access tables within that particular database without requiring elevated and\/or administrator permissions and jeopardizing the structure and relevance of the data that the database contains.<\/p>\n\n\n\n<p>Scrub all input of malicious code<br>One method of disallowing a SQL injection attack when handling user fields in a web from that reads or write to a database.<\/p>\n\n\n\n<p>Characterize the system, view the system as an adversary<br>The two steps of the threat model that data flow approaches.<\/p>\n\n\n\n<p>accessing ports that are not secured and\/or locked down, the exploitation of default passwords<br>The two attacks that can affect both the operating system and databases.<\/p>\n\n\n\n<p>Acquisition and Implementation<br>Control domain for the analysis and design phase of the SDLC.<\/p>\n\n\n\n<p>Monitoring, Delivery and Support<br>The control domain for the sustainment phase of the SDLC.<\/p>\n\n\n\n<p>Coding<br>Takes place in the construction phase of the SDLC.<\/p>\n\n\n\n<p>Task Refinement<br>Specific security activities must be identified when integrating security requirements into a work breakdown structure for the new software development effort.<\/p>\n\n\n\n<p>Release Manager<br>Conducts the code review process as one of the parts or processes of the software development. Can also deploy the finished product to the various environments at project completion.<\/p>\n\n\n\n<p>Business Analyst<br>Has the SDLC role to identify the requirements of an application (example: Web Application), must be able to identify who will be impacted by such an application. Once the application is developed in a test environment, must insure that the user acceptance testing is completed and to standards.<\/p>\n\n\n\n<p>Tester Role<br>Has the responsibility to prepare a document plan that will verify that a systems code performs the proper actions that it was designed to do.<\/p>\n\n\n\n<p>SQL Injection<br>A technique, used to attack data-driven applications, in which nefarious statements are inserted into an entry field for execution. This can be done from any form or place that allows the attacker to enter any type of information which is somewhat connected to a database.<\/p>\n\n\n\n<p>Beta version<br>The focus is reducing impacts to users, often incorporating usability testing and expectation of functionality. This software is often useful for demonstrations and previews within an organization and to prospective customers.<\/p>\n\n\n\n<p>STRIDE categories<br>Spoofing Identity,<br>Tampering with Data, Repudiation,<br>Information Disclosure, Denial of Service, Elevation of Privilege<\/p>\n\n\n\n<p>STRIDE<br>A classification scheme for characterizing\/measuring known threats\/vulnerabilities according to the kinds of exploit that are used (or motivation of the attacker). It also focuses on the end results of possible attacks rather than on the identification of each specific attack.<\/p>\n\n\n\n<p>Spoofing Identity<br>A key risk for applications that have many users but provide a single execution context at the application and database level. In particular, users should not be able to become any other user or assume the attributes of another user.<\/p>\n\n\n\n<p>Tampering with Data<br>Users can potentially change data delivered to them, return it, and thereby potentially manipulate client-side validation, GET and POST results, cookies, HTTP headers, and so forth. The application should not send data to the user, such as interest rates or periods, which are obtainable only from within the application itself. The application should also carefully check data received from the user and validate that it is sane and applicable before storing or using it.<\/p>\n\n\n\n<p>Repudiation<br>Users may dispute transactions if there is insufficient auditing or record keeping of their activity. For example, if a user says, &#8220;But I didn&#8217;t transfer any money to this external account!&#8221;, and you cannot track his\/her activities through the application, then it is extremely likely that the transaction will have to be written off as a loss. Therefore, consider if the application requires controls such as web access logs, audit trails at each tier, or the same user context from top to bottom. Preferably, the application should run with the user&#8217;s privileges, not more, but this may not be possible with many off-the-shelf application frameworks.<\/p>\n\n\n\n<p>Information Disclosure<br>Users are wary of submitting private details to a system. If it is possible for an attacker to publicly reveal user data whether anonymously or as an authorized user, there will be an immediate loss of confidence and a substantial period of reputation loss. Applications must include strong controls to prevent user ID tampering and abuse, particularly if they use a single context to run the entire application.<br>Consider if the web browser may leak information. Some web browsers may ignore the no caching directives in HTTP headers or handle them incorrectly. Every secure application has a responsibility to minimize the amount of information stored by the web browser, just in case it leaks or leaves information behind.<br>In implementing persistent values, the use of hidden fields is insecure by nature. Such storage should not be relied on to secure sensitive information or to provide adequate personal privacy safeguards.<\/p>\n\n\n\n<p>Denial of Service<br>The use of expensive resources such as large files, complex calculations, heavy-duty searches, or long queries should be reserved for authenticated and authorized users.<br>For applications that do not have this luxury, every facet of the application should be engineered to perform as little work as possible, to use fast and few database queries, to avoid exposing large files or unique links per user, in order to prevent simple attacks.<\/p>\n\n\n\n<p>Elevation of Privilege<br>If an application provides distinct user and administrative roles, then it is vital to ensure that the user cannot move to a higher role. Not displaying administrative role links is insufficient. All actions should be gated through an authorization matrix, to ensure that only the permitted roles can access administrative functionality.<\/p>\n\n\n\n<p>DREAD categories<br>Damage, Reproducibility, Exploitability\/Vulnerability, Affected users, Discoverability<\/p>\n\n\n\n<p>DREAD<br>Part of a system for risk-assessing computer security threats previously used at Microsoft and currently used by OpenStack and many other corporations. It provides a mnemonic for risk rating security threats using five categories.<\/p>\n\n\n\n<p>DREAD &#8211; Damage<br>How bad would an attack be? Ranks the extent of harm that occurs if a vulnerability is exploited.<\/p>\n\n\n\n<p>DREAD &#8211; Reproducibility<br>How easy is it to recreate the attack? Ranks how often an attempt at exploiting a vulnerability really works<\/p>\n\n\n\n<p>DREAD &#8211; Exploitability\/Vulnerability<br>How much work is it to launch the attack? Measures the effort required to launch the attack.<\/p>\n\n\n\n<p>DREAD &#8211; Affected users<br>how many people will be impacted? Measures the number of installed instances of the system affected by an exploit.<\/p>\n\n\n\n<p>DREAD &#8211; Discoverability<br>How easy is it to uncover the threat? States the likelihood that a vulnerability will be found by security researchers or hackers.<\/p>\n\n\n\n<p>DREAD threat assessment<br>Each category is given a rating on probability and damage potential. For example, 3 for high, 2 for medium, 1 for low and 0 for none. (Rating scales running from 0 to 10 are common) The sum of all ratings for a given exploit can be used to prioritize among different exploits.<\/p>\n\n\n\n<p>Threat Model<br>A diagram and description that tells a story of how an attacker could exploit the vulnerability. This is not a step by step process, but a narrative approach to the attack that should help guide the mitigation techniques that need to be put in place to protect the system. It defines the security of an application and reduces the number of vulnerabilities. It has the 2 steps of identifying and prioritizing vulnerabilities.<\/p>\n\n\n\n<p>Sequence Diagram<br>A detailed breakdown of the communication that will occur between actors and system objects or components. Bridges the gap between the business analysis and the development analysis; this can be considered a business or development description of system functionality.<\/p>\n\n\n\n<p>SDLC Management Control Domains<br>Planning \/ Organization,<br>Acquisition \/ Implementation, Delivery and Support,<br>Monitoring<\/p>\n\n\n\n<p>Planning \/ Organization<br>Project Definition, User Requirements Definition and Systems Requirement Definition<\/p>\n\n\n\n<p>Acquisition \/ Implementation<br>User Requirements Definition, System Requirement Definition, Analysis and Design and System Build \/ Prototype \/ Pilot<\/p>\n\n\n\n<p>Delivery and Support<br>Analysis and Design, System Build \/ Prototype \/ Pilot, Implementation and Training and Sustainment<\/p>\n\n\n\n<p>Monitoring<br>User Requirements Definition, Systems Requirements Definition, Analysis and Design, System Build \/ Prototype \/ Pilot, Implementation and Training and Sustainment<\/p>\n\n\n\n<p>Planning\/ Organization<br>Name the domain(s) for Project Definition<\/p>\n\n\n\n<p>Name the domain(s) for User Requirements Definition<br>Planning\/Organization, Acquisition\/Implementation, Monitoring<\/p>\n\n\n\n<p>Name the domain(s) for System Requirements Definition<br>Planning\/Organization, Acquisition\/Implementation, Monitoring<\/p>\n\n\n\n<p>Name the domain(s) for Analysis and Design<br>Acquisition\/Implementation, Delivery\/Support, Monitoring<\/p>\n\n\n\n<p>Name the domain(s) for System Build\/Prototype\/Pilot<br>Acquisition\/Implementation, Delivery\/Support, Monitoring<\/p>\n\n\n\n<p>Name the domain(s) for Implementation and Training<br>Delivery\/Support, Monitoring<\/p>\n\n\n\n<p>Name the domain(s) for Sustainment<br>Delivery\/Support, Monitoring<\/p>\n\n\n\n<p>Name the SDLC Phases<br>Project Definition, User Requirements Definition, System Requirements Definition, Analysis and Design, System Build\/Prototype\/Pilot, Implementation and Training, Sustainment<\/p>\n\n\n\n<p>Requirements Analysis<br>A phase of the SDLC that defines security functions that an application should satisfy. The designated employee can also speak with several stakeholders to determine the expected end state of the application.<\/p>\n\n\n\n<p>Testing Phase<br>Security should be involved in all phases of the SDLC, but exploitation of vulnerabilities to identify weaknesses should be done in this phase.<\/p>\n\n\n\n<p>Incident Response Plan<br>An organized approach to addressing and managing the aftermath of a security breach or compromise on a system or software. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. This will take place at the operation phase of the SDLC.<\/p>\n\n\n\n<p>Earned Value Management:<br>BCWS<br>Budget Cost Work Scheduled<\/p>\n\n\n\n<p>Earned Value Management:<br>BCWP<br>Budget Cost of Work Performed<\/p>\n\n\n\n<p>Earned Value Management: SV<br>Scheduled Variance<\/p>\n\n\n\n<p>Earned Value Management: CV<br>Cost Variance<\/p>\n\n\n\n<p>SV equation<br>BCWP &#8211; BCWS<\/p>\n\n\n\n<p>CV equation<br>BCWP &#8211; ACWP<\/p>\n\n\n\n<p>Earned Value Management: ACWP<br>Actual Cost of Work Performed<\/p>\n\n\n\n<p>Steps in the Work Breakdown Structure (WBS):<br>1) Examine the set of required external deliverables.<br>2) Identify and list the steps and tasks needed to produce the required deliverables, including any tasks for additional intermediate deliverables needed to complete the final deliverable.<br>3) Sequence the identified tasks required to produce the deliverable.<br>4) Estimate the effort required to perform each task.<br>5) Estimate the productivity of the resources that will be applied to the tasks.<br>6) Compute the time needed for each task by dividing the task effort estimates by the resource productivity estimates.<br>7) Lay out the time needed for each task and &#8220;label&#8221; each task with its task name and the assigned resources; this layout of sequences of tasks with their associated time and resources essentially forms the initial schedule.<\/p>\n\n\n\n<p>Capability Maturity Model Integration (CMMI) levels: ML5<br>Organizational innovations and deployment,<br>Casual analysis and resolution,<br>Overall testing to achieve efficiencies<\/p>\n\n\n\n<p>Capability Maturity Model Integration (CMMI) levels: ML4<br>Organizational process performance,<br>Quantitative project management<\/p>\n\n\n\n<p>Capability Maturity Model Integration (CMMI) levels: ML3<br>Requirements development,<br>Technical solution,<br>Product integration,<br>Verification,<br>Validation,<br>Organizational process focus,<br>Organizational process definition,<br>Organizational training,<br>Integrated project management,<br>Risk Management,<br>Integrated teaming,<br>Integrated supplier management,<br>Decision analysis and resolution,<br>Organizational environment for integration<\/p>\n\n\n\n<p>Capability Maturity Model Integration (CMMI) levels: ML2<br>Requirements management,<br>Project planning,<br>Project monitoring and control,<br>Supplier agreement management,<br>Measurement and analysis,<br>Process and product quality assurance,<br>Configuration management<\/p>\n\n\n\n<p>NONE<br>Capability Maturity Model Integration (CMMI) levels: ML1<\/p>\n\n\n\n<p>The Processes areas of CMMI: Project Management<br>1) Project Planning<br>2) Project Monitoring and control<br>3) Supplier agreement management<br>4) Integrated project management<br>5) Risk Management<br>6) Integrated teaming<br>7) Integrated supplier management<br>8) Quantitative project management<\/p>\n\n\n\n<p>The Processes areas of CMMI: Engineering<br>1) Requirements development<br>2) Requirements Management<br>3) Technical Solution<br>4) Product Integration<br>5) Verification<br>6) Validation<\/p>\n\n\n\n<p>The Processes areas of CMMI: Support<br>1) Configuration Management<br>2) Process and product quality assurance<br>3) Measurement and Analysis<br>4) Organizational environment for integration<br>5) Decision analysis and resolution<br>6) Casual analysis and resolution<\/p>\n\n\n\n<p>The Processes areas of CMMI: Process Management<br>1) Organizational process focus<br>2) Organizational process definition<br>3) Organizational Training<br>4) Organizational process performance<br>5) Organizational innovation and deployment<\/p>\n\n\n\n<p>Rational Unified Process (RUP)<br>A software development methodology from Rational. Based on UML, it organizes the development of software into four phases, each consisting of one or more executable iterations of the software at that stage of development. It&#8217;s also an interactive and incremental model that utilizes the divide and conquer methodology to decompose a complex problem into smaller parts. It&#8217;s also heavy with formal, established framework.<\/p>\n\n\n\n<p>Extreme Programming (XP)<br>Based on four core values of communication, simplicity, feedback, and courage. It also includes fundamental principles of incremental change, embracing change and quality of work.<\/p>\n\n\n\n<p>Scrum<br>A disciplined method that can be combined with other techniques.<\/p>\n\n\n\n<p>Warm Site<br>Might be a designated building with servers, computers, and the needed office space, but with no active connections or running servers.<\/p>\n\n\n\n<p>Data Encryption Standard (DES)<br>The formal United States national standard crypto-system for securing information; it&#8217;s an example of a Feistel cipher using a 56-bit key. It&#8217;s now considered breakable.<\/p>\n\n\n\n<p>3-DES<br>The formal United States national standard crypto-system for securing information; it&#8217;s an example of a Feistel cipher using three separate 56-bit keys.<\/p>\n\n\n\n<p>Secure Software Assurance (SSA)<br>Use of established quality assurance practices and fault tolerance techniques; Ability of software to operate dependably, despite the presence of sponsored faults and security as a part of the software specified in the beginning of the software development process.<\/p>\n\n\n\n<p>White Box Testing<br>Source code fault injection, direct code analysis and property based testing.<\/p>\n\n\n\n<p>Black Box Testing<br>Fuzz testing, byte code, assembler code and binary code scanning.<\/p>\n\n\n\n<p>Unintentional disclosure<br>Occurs when your software prints too much information in response to queries or when it prints to public error logs. Internal data can often be the target of the attacker, so what you share via output in development or in production needs to be considered as a possible source of compromise.<\/p>\n\n\n\n<p>Man in the Middle Attack (MitM, MiM attack, MitMA)<br>In cryptography and computer security, this is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.<\/p>\n\n\n\n<p>Attack surface in relation to threat: Network<br>Sniffing<\/p>\n\n\n\n<p>Attack surface in relation to threat: Operating System<br>Rootkit<\/p>\n\n\n\n<p>Attack surface in relation to threat: Programming Language<br>Buffer Overflow<\/p>\n\n\n\n<p>Attack surface in relation to threat: Database Application<br>Injection<\/p>\n\n\n\n<p>Quality Assurance<br>Refers to all activities designed to measure and improve a product , including the whole process, training, preparation of the team, and activities associated with customer feedback.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C706 Secure Software Design Study Guide20221.Confidentiality: Information is not made available or disclosed tounauthorized individuals, entities, or processes. Ensures unauthorizedpersons are not able to read private and sensitive data. It is achievedthrough cryptography.2.Integrity: Ensures unauthorized persons or channels are not able tomodify the data. It is accomplished through the use of a messagedigest or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-111378","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=111378"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111378\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=111378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=111378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=111378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}