8-62.3 Secure Coding Practices Flashcards
1
Q
The process used to anticipate threats
A
Threat Modeling
2
Q
Allow only the minimum levels of access necessary to perform tasks or functions
A
Least privilege
3
Q
Cryptographic method to confirm authenticity and integrity
A
Code signing
4
Q
Property that describes an applications ability to withstand attack
A
Survivability
5
Q
All of the points where an attacker can try to enter or extract dats
A
Attack Surface